ENCRYPTION
ENCRYPTION
The meaning of the term computer security has evolved in recent years. Before the problem of data
security became widely publicized in the media, most people’s idea of computer security focused on the
physical machine. Traditionally, computer facilities have been physically protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
Computer security is security applied to computing devices such as computers and smartphones, as well
as computer networks such as private and public networks, including the whole Internet. The field covers
all the processes and mechanisms by which digital equipment, information and services are protected
from unintended or unauthorized access, change or destruction, and are of growing importance in line
with the increasing reliance on computer systems of most societies worldwide. It includes physical
security to prevent theft of equipment, and information security to protect the data on that equipment. It is
sometimes referred to as "cyber security" or "IT security", though these terms generally do not refer to
physical security (locks and such).
SECURITY SERVICES/GOALS
The classification of security services are as follows:
Confidentiality: Ensures that the information in a computer system and transmitted information are
accessible only for reading by authorized parties.
E.g. Printing, displaying and other forms of disclosure.
Authentication: Ensures that the origin of a message or electronic document is correctly identified, with
an assurance that the identity is not false.
Integrity: Ensures that only authorized parties are able to modify computer system assets and transmitted
information. Modification includes writing, changing status, deleting, creating and delaying or replaying
of transmitted messages.
Non repudiation: Requires that neither the sender nor the receiver of a message be able to deny the
transmission.
Access control: Requires that access to information resources may be controlled by or the target system.
Availability: Requires that computer system assets be available to authorized parties when needed.
SECURITY ATTACKS
There are four general categories of attack which are listed below.
Interruption
An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on availability
e.g., destruction of piece of hardware, cutting of a communication line or Disabling of file management
system.
Interception
An unauthorized party gains access to an asset. This is an attack on confidentiality.
Unauthorized party could be a person, a program or a computer. e.g., wire tapping to capture data in the
network, illicit copying of files
Modification
An unauthorized party not only gains access to but tampers with an asset. This is an attack on integrity.
e.g., changing values in data file, altering a program, modifying the contents of messages being
transmitted in a network.
Fabrication
An unauthorized party inserts counterfeit objects into the system. This is an attack on authenticity. e.g.,
insertion of spurious message in a network or addition of records to a file.
NETWORK SECURITY
ENCRYPTION
SYSMMETRIC ASYMMETRIC
Encryption
KEY
Decryption
Two independent keys
Pair of keys
KEY KEY
Symmetric KS KS
Asymmetric KUA KRA
KRA KUA
CRYPTOGRAPHIC ALGORITHMS
SECURITY SERVICES
CONFIDENTIALITY AUTHENTICATION DIGITAL SIGNATURES
(Enc , Dec) integrity sender private key
Symmetric
Substitution (Character)
Transposition (Numeric)
Substitution
Ceasar cipher
Play fair cipher
Limitation
Used for short period of time
Ceasar
A B C D E F G H I
1 2 3 4 5 6 7 8 9
J K L M N O P Q R
10 11 12 13 14 15 16 17 18
S T U V W X Y Z
19 20 21 22 23 24 25 26
KEY –numerical, K
1< K < 26
C= (P + K ) Mod 26
Example
Plaintext = HELLO
C (H) = (8+4) mod 26
12 mod 26
C (H) = 12 =L
C(E) = (5 +4 ) mode 26
9 mod 26
C(H) = I
9 I
C(L) (12 +4) mod 26
16 mode 26
16 = P
C(O) = (15 + 4 ) mod 26
19 mod 26
19 = S
C (O) = (15 + 4) mod 26
19 mod 26
19= S
Plain text = ZOO
Cipher = DSS
Calculation of MOD
Operation of MOD
MOD = Reminder of Division
5 mod 2
Remainder (5/2)
2)5(2
4
1 remainder
2 mod 5
5)2(5
0
2 remainder
2 mod 5 = 2
9 mod 5 is a
If (a <b)
Play fair C8
N E T W O
R K A B C
D F G H i/j
L M P Q S
U V X Y Z
5x5 = 25
One letter
They share
Steps
Fill the key
RULES
i. Divide plain text to pair of the letters
ii. Differentiate repeated letters in the pair with dummy letters
iii. If pair of plaintext letters are in same row, replace them with right most same column
iv. If PT letters in different row 8 column
Replace with the character which is the column corresponding row (diagonal)
Example
Divide
HE
LL is repeated
O add dummy letter to make a set
Differentiate with dummy character
HE/LX/LO
HE check whether they fall in the same row and column
Replace
HE WF
LX UP
LO NS
HEL X LO = Plain
WFUPNS = cipher
Example 2
PT =BALLON
KEY=NETWORK
C.T = ?
N E T W O
R K A B C
D F G H I/J
L M P Q S
U V X Y Z
BA/LL/OO/N
BA= CB
LX= UP
LO=NS
ON=NE
What is worm?
A worm is a program that can replicate itself and send copies from computer to computer across network
connections.
Four general techniques of firewall.
❖ Security control
❖ Direction control
❖ User control
❖ Behavior control
Three types of firewall.
❖ Packet filter
❖ Application level gateway
❖ Circuit level gateway.
The assurance that the communicating entity is the one that it claims to be.
Access control: The prevention of unauthorized use of a resource (i.e., this service controls who can have
access to a resource, under what conditions access can occur, and what those accessing the resource are
allowed to do).
Data confidentiality: The protection of data from unauthorized disclosure.
Data integrity: The assurance that data received are exactly as sent by an authorized entity (i.e., contain
no modification, insertion, deletion, or replay).
Nonrepudiation: Provides protection against denial by one of the entities involved in a communication
of having participated in all or part of the communication.
Availability service: The property of a system or a system resource being accessible and usable upon
demand by an authorized system entity, according to performance specifications for the system (i.e., a
system is available if it provides services according to the system design whenever users request them).
Mechanisms that are not specific to any particular OSI security service or protocol layer.
Trusted Functionality
That which is perceived to be correct with respect to some criteria (e.g., as established by a security
policy).
Security Label
The marking bound to a resource (which may be a data unit) that names or designates the security
attributes of that resource.
Event Detection
Detection of security-relevant events.
Security Audit Trail
Data collected and potentially used to facilitate a security audit, which is an independent review and
examination of system records and activities.
Security Recovery
Deals with requests from mechanisms, such as event handling and management functions, and takes
recovery actions.
Proxy Servers
A proxy service is an application that redirects users’ requests to the actual services based on an
organization’s security policy. All communication between a user and the actual server occurs through the
proxy server. Thus, a proxy server acts as a communications broker between clients and the actual
application servers. Because it acts as a checkpoint where requests are validated against specific
applications, a proxy server is usually processing intensive and can become a bottleneck under heavy
traffic conditions. Proxy servers can operate at either the application layer or the transport layer. Thus,
there are two classes of proxy servers: application gateways, which operate at the application layer; and
circuit-level gateways, which operate at the transport layer.
Application Gateways
An application gateway is a proxy server that provides access control at the application layer. It acts as an
application-layer gateway between the protected network and the untrusted network. Because it operates
at the application layer, it is able to examine traffic in detail and, therefore, is considered the most secure
type of firewall. It can prevent certain applications, such as FTP, from entering the protected network. It
can also log all network activities according to applications for both accounting and security audit
purposes. Application gateways can also hide information. Since all requests for services in the protected
network pass through the application gateway, it can provide network address translation (or IP address
hiding) functionality and conceal IP addresses in the protected network from the Internet by replacing the
IP address of every outbound packet (that is, packets going from the protected network to the Internet)
with its own IP address. Network address translation also permits unregistered IP addresses to be freely
used in the protected network because the gateway will map them to its own IP address when the users
attempt to communicate with the outside world.
Circuit-Level Gateways
A circuit-level gateway is a proxy server that validates TCP and UDP sessions before allowing a
connection or circuit through the firewall. It is actively involved in the connection establishment and does
not allow packets to be forwarded until the necessary access control rules have been satisfied. A circuit-
level gateway is not as secure as an application gateway because it validates TCP and UDP sessions
without full knowledge of the applications that use these transport services. Moreover, once a session has
been established, any application can run across that connection. This behavior exposes the protected
network to attacks from intruders. Unlike a circuit-level gateway, an application gateway can differentiate
the applications that need to be blocked from those that can be allowed to pass through the gateway.
Stateful Packet Filters
Although the application gateway provides the best security among the preceding firewalls, its intensive
processing requirement slows down network performance. A stateful packet filtering gateway attempts to
provide tight security without compromising performance. Unlike the application gateway, it checks the
data that passes through at the network layer but does not process it. The firewall maintains state
information for each session, where session states include a combination of communication phase and the
endpoint application state. When a stateful packet filtering gateway receives a data packet, it checks the
packet against the known state of the session. If the packet deviates from the expected session state, the
gateway blocks the rest of the session.
NOTE
Confidentiality
Confidentiality refers to data being accessible only by the intended individual or party. The focus of
confidentiality is to ensure that data does not reach unauthorized individuals.
• Training
o Sensitive data handling and disposal
• Physical access control
o Storing personal documents in locked cabinets
• Logical access control
o User IDs, passwords and two-factor authentication
• Data encryption
Integrity
Availability simply refers to ensuring that data is available to authorized individuals when required. Data
only has value if it is accessible at the required moment. A common form of attack on availability is a
Denial of Service (DoS) which prevents authorized individuals from accessing the required data. You
may be aware of the recent ransomware attack on UCL. This was a DoS attack as it prevented users from
being able to access their own files and requested for a ransom in exchange for reinstating that access.
In order to ensure availability of data, the following measures may be used:
• Regular backups
• Redundancy
o Off-site data Centre
• Adequate communication bandwidth
What is ID Spoofing?
It is the practice of using the telephone network to display a number on the recipient's Caller ID display
which is not that of the actual originating station.
It is the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments,
and enemies for military, political, or economic advantage using illegal exploitation methods on the
internet.
Sabotage literally means willful damage to any machinery or materials or disruption of work. In the
context of cyberspace, it is a threat to the existence of computers and satellites used by military activities
What are Trojans and Spyware?
Trojans and spyware are the tools a cyber-criminal might use to obtain unauthorized access and steal
information from a victim as part of an attack.
Phishing and Pharming are the most common ways to perform identity theft which is a form of cyber-
crime in which criminals use the internet to steal personal information from others.
Explain network security. What are the types of security features used in client server types of
network?
Ans:
Network security means the protection of networks and their services from unauthorized access,
modification, destruction or disclosure. It provides for assurance that a network performs its critical
functions correctly and there are no harmful side effects.
Security features used in Client-Server types of network are as follows :
i) Digital Signatures
ii) Encryption / Decryption
iii) Secure Socket Layer (SSL)
iv) Firewalls.
b. What is Public Key Cryptography? What are its advantages and disadvantages? (7)
Ans:
Public-key cryptography is a form of modern cryptography which allows users to communicate safely
without previously agreeing on a shared secret key. There are a number of significant practical difficulties
in this approach to distributing keys.
Public-key cryptography was invented to address these drawbacks — with public-key cryptography, users
can communicate with safety over an insecure channel without having to agree upon a key beforehand.
Public-key algorithms typically use a pair of two related keys — one key is private and must be kept
secret, while the other is made public and can be widely distributed; it should not be possible to deduce
one key of a pair given the other.
Advantages
(i) Increased security and convenience
(ii) Electronic records may be authenticated by affixing digital signatures
Disadvantages
Used to encrypt a secret key which is used to encrypt the bulk of a file or message. Such a protocol is
called a digital envelope
Public-key cryptography is not necessary and secret-key cryptography alone is sufficient.
This includes environments where secure secret-key agreement can take place, for example by users
meeting in private.
Explain the use of the following terms:
i) Public Key Encryption
ii) Secret Key Encryption
Ans:
A cryptographic system that uses two-keys—a public key known to everyone and a private or secret key
known only to the recipient of the message.
An important element to the public key system is that the public and private keys are related in such a
way that only the public key can be used to encrypt messages and only the corresponding private key can
be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the
public key.
They are extremely secure and relatively simple to use.
These algorithms lead to several varieties of public key encryption (PKE). PKE addresses three issues that
flaw many encryption schemes;
PKE is computationally difficult to decode.
PKE does not require a secure channel to send the key; the key is, in fact, public.
How does an authentication system differ from a firewall in functioning?
Ans:
Authentication vs firewall
User Authentication and Authorization
An important advanced firewall security feature is user-oriented authentication, which is the ability to
allow or deny certain connections based on user name and password combination or some other, more
advanced identification scheme.
Various authentication technologies are available. The simplest forms require typing a user name and a
reusable password.
This method is suitable for controlling only outbound Internet access, because password guessing and
eavesdropping attacks are likely on inbound access attempts.
Firewalls can log network activity in detail, filter the log to produce meaningful reports, and alert a
network administrator when the network has reached a predefined threshold.
The firewall software supports at least Internet services:
Gopher
SMTP
Telnet
DNS name resolution, preferably by letting you run DNS on the firewall and on an
internal system.
Give the types of firewalls and explain any one type in detail.
Ans: