Upload
asif-reman-arman
View
222
Download
3
Embed Size (px)
8/17/2019 Cryptography Introduction BUP
1/71
Introduction
Dr. Md. Mahbubur Rahman
8/17/2019 Cryptography Introduction BUP
2/71
Textbook
Cryptography: Theory and
Practice
by Douglas R. Stinson CRC
press
Cryptography and Network
Security: Principles and
Practice;By William Stallings
Prentice Hall
Network Security: Private
Communication in a Pulic
World
Charlie !au"man# $adia
8/17/2019 Cryptography Introduction BUP
3/71
Learning Objectives
• Describe the key security requirements ofcondentiality, integrity, and availability
• Discuss the types of security threats andattacks that must be dealt with and give
examples of threats and attacks that apply todierent categories of computer and networkassets
• Summarie the functional requirements for
computer security
• Describe the !"#$$ security architecture for%S&
• 'ryptography applications
8/17/2019 Cryptography Introduction BUP
4/71
Cryptography
()idden writing*
&ncreasingly used to protect
information 'an ensure condentiality• &ntegrity and +uthenticity too
8/17/2019 Cryptography Introduction BUP
5/71
History – The Manual Era
Dates back to at least $$$ -"'" .en and .aper 'ryptography
/xamples• Scytale
• +tbash
• 'aesar• 0igen1re
8/17/2019 Cryptography Introduction BUP
6/71
&nvention of cipher machines /xamples• 'onfederate +rmy2s 'ipher Disk
• 3apanese 4ed and .urple 5achines
• 6erman /nigma
History – The Mechanical Era
8/17/2019 Cryptography Introduction BUP
7/71
'omputers7
/xamples• 8ucifer
• 4i9ndael
• 4S+
• /l6amal
History – The Modern Era
8/17/2019 Cryptography Introduction BUP
8/71
Computer Security Concepts
• -efore the widespread use of data processingequipment, the security of information valuable toan organiation was provided primarily by physicaland administrative means
• :ith the introduction of the computer, the need for
automated tools for protecting les and otherinformation stored on the computer becameevident
• +nother ma9or change that aected security is the
introduction of distributed systems and the use ofnetworks and communications facilities for carryingdata between terminal user and computer andbetween computers
8/17/2019 Cryptography Introduction BUP
9/71
• Computer security• ;he generic name for the collection of
tools designed to protect data and to
thwart hackers• internet security
• 'onsists of measures to deter, prevent,detect, and correct security violations that
involve the transmission o inormation
8/17/2019 Cryptography Introduction BUP
10/71
Security Trends
8/17/2019 Cryptography Introduction BUP
11/71
Computer Se%urity “The protection
afforded to an automated
information system inorder to attain the
applicable objectives of
preserving the integrity,
availability, andconfidentiality of
information system
resources (includes
hardware, software,
firmware,
information/data, and
telecommunications)”
The '(ST Computer
Security Handook defines
the term %omputer se%urity
as)
This definition introdu%es three
key ob*e%ti#es that are at the
heart of %omputer se%urity.
N!T" National nstitute of !tandards
and Technology
8/17/2019 Cryptography Introduction BUP
12/71
!IST
8/17/2019 Cryptography Introduction BUP
13/71
Computer Security Objectives
• "ata con#dentiality• +ssures that private or condential
information is not made available ordisclosed to unauthoried individuals
•
$rivacy• +ssures that individuals control or
in
8/17/2019 Cryptography Introduction BUP
14/71
• "ata integrity• +ssures that information and programs
are changed only in a specied andauthoried manner• System integrity• +ssures that a system performs itsintended function in an unimpaired
manner, free from deliberate orinadvertent unauthoried manipulation ofthe system
&ntegrity
8/17/2019 Cryptography Introduction BUP
15/71
C(A Triad
The Se%urity Re+uirements Triad
8/17/2019 Cryptography Introduction BUP
16/71
8/17/2019 Cryptography Introduction BUP
17/71
Integrity : Information needs to be changed constantly.
Integrity means that changes need to be done only by authorized
entities and through authorized mechanisms.
Availability : The information created and stored by an
organization needs to be available to authorized entities.
Information needs to be constantly changed, which means it must
be accessible to authorized entities.
Confidentiality is probably the most common aspect of
information security. We need to protect our confidential
information. An organization needs to guard against those
malicious actions that endanger the confidentiality of its
information.
8/17/2019 Cryptography Introduction BUP
18/71
"ossible additional %on%epts)
+uthenticity• 0erifying that users
are who they saythey are and thateach input arrivingat the system camefrom a trustedsource
+ccountability• ;he security goal
that generates therequirement foractions of an entityto be traceduniquely to thatentity
8/17/2019 Cryptography Introduction BUP
19/71
,rea%h of Se%urity
- e#els of (mpa%t
• ;he loss could be expected to have asevere or catastrophic adverseeect on organiational operations,organiational assets, or individuals
)igh
• ;he loss could be expected to havea serious adverse e%ect onorganiational operations,organiational assets, or individuals
5oderate
• ;he loss could be expected
to have a limitedadverse e%ect onorgani&ationaloperations'organiational assets, orindividuals
8ow
8/17/2019 Cryptography Introduction BUP
20/71
E(amples o Security )e*uirements
Con#dentiality
Student gradeinormation is an
asset whosecondentiality isconsidered to be
highly important bystudents
4egulated by the=amily /ducational
4ights and .rivacy +ct>=/4.+?
Integrity
+consistency,
$atient inormationstored in a database
@ inaccurateinformation could
result in serious harmor death to a patient
and expose thehospital to massive
liability+ -eb site thato%ers a orum to
registered users todiscuss some specic
topic would beassigned a moderate
level of integrity+n example of a lowAintegrity requirement
is an anonymous
online poll
.vailability
;he more critical acomponent or
service, the higherthe level of availability
required
+ moderateavailability
requirement is apublic -eb site or
a university
+n online telephonedirectory loo/up
application would beclassied as a lowA
availability
requirement
8/17/2019 Cryptography Introduction BUP
21/71
Computer Security Challenges
Se%urity is not simple#otential attac$s on the
se%urity features need to
be considered
"ro%edures used to pro#ide
parti%ular ser#i%es are oftencounter%intuitive
(t is ne%essary to de%ide
where to use the #arious
se%urity me%hanisms
Re+uires constantmonitoring
(s too often an
afterthought
Se%urity me%hanismstypi%ally in#ol#e more than
a particular algorithm or
protocol
Se%urity is essentially a
battle of wits bet/een aperpetrator and the designer
&ittle benefit from se%urity
in#estment is perceived
until a se%urity failure o%%urs
Strong se%urity is often#ie/ed as an impediment
to effi%ient and user0friendly
operation
8/17/2019 Cryptography Introduction BUP
22/71
IT01T
The T' Telecommunication !tandardiation !ector
1T'%T2 is one of the three se%tors 1di#isions or units2 ofthe (nternational Tele%ommuni%ation 3nion 1(T324 it
%oordinates standards for tele%ommuni%ations.
The (T30T mission is to ensure the effi%ient and timely
produ%tion of standards %o#ering all fields of
tele%ommuni%ations on a /orld/ide basis! as /ell as
defining tariff and a%%ounting prin%iples for internationaltele%ommuni%ation ser#i%es.
http://en.wikipedia.org/wiki/International_Telecommunication_Unionhttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/International_Telecommunication_Union
8/17/2019 Cryptography Introduction BUP
23/71
OSI
!% The nternational rganiation for
!tandardiation (*rench" Organisation internationale
de normalisation+) produced ! ($pen Systems
(nter%onne%tion Referen%e Model! the $S( Referen%eModel! or e#en *ust the $S( Model)
http://en.wikipedia.org/wiki/French_languagehttp://en.wikipedia.org/wiki/French_language
8/17/2019 Cryptography Introduction BUP
24/71
History O2 OSI
(n the late 5678s! t/o pro*e%ts began independently! /iththe same goal) to define a unifying standard for the
ar%hite%ture of net/orking systems.
$ne /as administered by the (nternational $rganiationfor Standardiation 1(S$2! /hile the other /as undertaken
by the (nternational Telegraph and Telephone Consultati#e
Committee! or CC(TT 1the abbre#iation is from the 9ren%h
#ersion of the name2.
These t/o international standards bodies ea%h de#eloped
a do%ument that defined similar net/orking models. (S$
7:6;! (T30T 1formerly CC(TT 2 standard
8/17/2019 Cryptography Introduction BUP
25/71
34566
8/17/2019 Cryptography Introduction BUP
26/71
$S( Se%urity Ar%hite%ture
!ecurity attac$
ny action that compromises the se%urity of information
o/ned by an organiation
!ecurity mechanism
process 1or a de#i%e in%orporating su%h a pro%ess2 thatis designed to detect, prevent, or recover from a se%urity
atta%k
!ecurity service
processing or communication service that enhances
the security of the data pro%essing systems and theinformation transfers of an organiation
ntended to counter security attac$s! and they make
use of one or more se%urity me%hanisms to pro#ide the
ser#i%e
(T30T Re%ommendation
8/17/2019 Cryptography Introduction BUP
27/71
IET2 and )2C
The nternet -ngineering Tas$ *orce 1-T*2 156;>2
de#elops and promotes #oluntary (nternet standards! in
parti%ular the standards that %omprise the
(nternet proto%ol suite 1TC"?("2.
A .euest for 0omments 1.*02 is a publi%ation of the
(nternet @ngineering Task 9or%e 1(@T92 and the
(nternet So%iety! the prin%ipal te%hni%al de#elopment and
standards0setting bodies for the (nternet.
The nternet !ociety 1!oc2 is an international! non0
profit organiation founded in 566= to pro#ide leadership
in (nternet related standards! edu%ation! and poli%y.
http://en.wikipedia.org/wiki/Internet_standardhttp://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_Societyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Societyhttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_protocol_suitehttp://en.wikipedia.org/wiki/Internet_standard
8/17/2019 Cryptography Introduction BUP
28/71
ATTACKS
The three goals of security
confidentiality,integrity, and availability can be threatened
by security attacks.
8/17/2019 Cryptography Introduction BUP
29/71
Threats and .ttac/s +)2C 7878,
Internet Security9lossary' :ersion ;
;his 6lossary provides denitions, abbreviations, andexplanations of terminology for information systemsecurity"
8/17/2019 Cryptography Introduction BUP
30/71
8/17/2019 Cryptography Introduction BUP
31/71
Se%urity Atta%ks
means of classifying se%urity atta%ks! used both in
8/17/2019 Cryptography Introduction BUP
32/71
"assi#e Atta%ks
1T/o types2
Two types of passi#e
atta%ks are)
The release of
message %ontentsTraffi% analysis
Are in the nature ofeavesdropping on! or
monitoring of !transmissions
Boal of the opponent isto obtain information
that is being transmitted
8/17/2019 Cryptography Introduction BUP
33/71
Snooping refers to unauthorized access to or interception ofdata.
8/17/2019 Cryptography Introduction BUP
34/71
Traffic analysis refers to obtaining some other type ofinformation by monitoring online traffic.
.ctive .ttac/s +7 types,
8/17/2019 Cryptography Introduction BUP
35/71
.ctive .ttac/s +7 types,
nvolve some modification of the data stream or the%reation of a false stream
1ifficult to prevent be%ause of the /ide #ariety of potential
physi%al! soft/are! and net/ork #ulnerabilities
2oal is to detect attac$s and to recover from any disruption
or delays %aused by them
8/17/2019 Cryptography Introduction BUP
36/71
Modification means that the attacker intercepts the message
and changes it.
Masquerading or spoofing happens when the attacker
impersonates somebody else.
Replaying means the attacker obtains a copy
of a message sent by a user and later tries to replay it.
Repudiation means that sender of the message might laterdeny that she has sent the message the receiver of the
message might later deny that he has received the message.
8/17/2019 Cryptography Introduction BUP
37/71
Denial of service (DoS) is a very common attack. It mayslow down or totally interrupt the service of a system.
8/17/2019 Cryptography Introduction BUP
38/71
ctive ttac$s (3 types)
8/17/2019 Cryptography Introduction BUP
39/71
8/17/2019 Cryptography Introduction BUP
40/71
8/17/2019 Cryptography Introduction BUP
41/71
SERVICES AND MECHANISMS
IT!T provides some security services and some
mechanisms to implement those services. Security
services and mechanisms are closely related because a
mechanism or combination of mechanisms are used to
provide a service.
8/17/2019 Cryptography Introduction BUP
42/71
Security Services
Se%urity ser#i%e defined by
8/17/2019 Cryptography Introduction BUP
43/71
8/17/2019 Cryptography Introduction BUP
44/71
8/17/2019 Cryptography Introduction BUP
45/71
SecurityServices>!"#$$?
Authenti%ation
8/17/2019 Cryptography Introduction BUP
46/71
Authenti%ation
Con%erned /ith assuring that a %ommuni%ation is
authenti%(n the %ase of a single message! assures the
re%ipient that the message is from the sour%e that it
%laims to be from
(n the %ase of ongoing intera%tion! assures the twoentities are authentic and that the %onne%tion is
not interfered /ith in su%h a /ay that a third party
%an mas+uerade as one of the t/o legitimate
parties
T/o entities are %onsidered peers if they implement
the same proto%ol in different systems 1e.g.! t/o TC" modules in t/o
%ommuni%ating systems2.
8/17/2019 Cryptography Introduction BUP
47/71
A%%ess Control
The ability to limit and control the access to hostsystems and appli%ations #ia %ommuni%ations links
To a%hie#e this! ea%h entity trying to gain a%%ess must
first be identified! or authenticated, so that a%%ess
rights %an be tailored to the indi#idual
8/17/2019 Cryptography Introduction BUP
48/71
Data Confidentiality
The prote%tion of transmitted data from passive attac$s
4roadest service prote%ts all user data transmittedbet/een t/o users o#er a period of time
Narrower forms of service in%lude the protection of
a single message or e#en spe%ifi% fields /ithin a
message
The protection of traffic flow from analysis
This re+uires that an attac$er not be able to observe
the source and destination, freuency, length, or
other %hara%teristi%s of the traffi% on a %ommuni%ations
fa%ility
Data (ntegrity
8/17/2019 Cryptography Introduction BUP
49/71
Data (ntegrity
'onrepudiation
8/17/2019 Cryptography Introduction BUP
50/71
'onrepudiation
"re#ents either sender or re%ei#er from denying a
transmitted message
hen a message is sent! the receiver can prove that
the alleged sender in fa%t sent the message
hen a message is re%ei#ed! the sender can prove
that the alleged re%ei#er in fa%t re%ei#ed the message
A#ailability ser#i%e
8/17/2019 Cryptography Introduction BUP
51/71
A#ailability ser#i%e
A#ailability
The property of a system or a system resour%e being
accessible and usable upon demand by anauthoried system entity! a%%ording to
performan%e spe%ifi%ations for the system
A#ailability ser#i%e
$ne that prote%ts a system to ensure its availabilityddresses the security %on%erns raised by denial%
of%service attac$s
Depends on proper management and %ontrol of
system resour%es
Security Mechanisms +3 566,
8/17/2019 Cryptography Introduction BUP
52/71
Security Mechanisms +34566,
• Specic security mechanismsB incorporatedinto the appropriate protocol layer in order toprovide some of the %S& security services
• /ncipherment
• digital signatures
• access controls
• data integrity
• authentication exchange
• traCc padding
• routing control
• notariation
8/17/2019 Cryptography Introduction BUP
53/71
8/17/2019 Cryptography Introduction BUP
54/71
Security
5echanisms>!"#$$?
)elationship
8/17/2019 Cryptography Introduction BUP
55/71
)elationship
8/17/2019 Cryptography Introduction BUP
56/71
)elationship
8/17/2019 Cryptography Introduction BUP
57/71
5.7
TECHNIQUES
!echanisms discussed already are only theoretical
recipes to implement security. The actual
implementation of security goals needs some
techni"ues. Two techni"ues are prevalent today#cryptograp"y and steganograp"y#
$ h
8/17/2019 Cryptography Introduction BUP
58/71
5.;
$ryptography
$ryptography, a word with %reek origins, means&secret writing.' (owever, we use the term to refer to
the science and art of transforming messages to make
them secure and immune to attacks.
Steganography
8/17/2019 Cryptography Introduction BUP
59/71
5.6
Steganography
The word steganography, with origin in %reek, means
&covered writing,' in contrast with cryptography, whichmeans &secret writing.'
)*ample# covering data with te*t
8/17/2019 Cryptography Introduction BUP
60/71
5.>8
)*ample# using dictionary
)*ample# covering data under color image
-hat is Cryptology
8/17/2019 Cryptography Introduction BUP
61/71
a s C yp o ogy
cryptographyB ;he act or art of writing in secret characters"
• cryptanalysisB ;he analysis and deciphering of secretwritings"• cryptologyB >:ebster2s? the scientic study of cryptographyand cryptAanalysis"&n our context cryptology is the scientic study of protection
of information"
Cryptographic Services
8/17/2019 Cryptography Introduction BUP
62/71
yp g p
'ryptography supports the following servicesB
" 'ondentiality
" &ntegrity
E" +uthentication
F" &dentity
G" ;imeliness
H" .roof of ownership
/ach has various dierent requirements in dierentcircumstances, and each issupported by a wide variety ofschemes"
.pplications
8/17/2019 Cryptography Introduction BUP
63/71
pp
" 'ommunications >encryption or
authentication?
" =ile and data base security
E" /lectronic funds transfer
F" /lectronic 'ommerce
G" Digital cash
H" 'ontract signing
I" /lectronic mail
#" +uthenticationB .asswords, .&Js
K" Secure identication, +ccess control
$" Secure protocols
" .roof of knowledge
.pplications +cont4,
8/17/2019 Cryptography Introduction BUP
64/71
pp + ,
" 'onstruction by collaborating parties >secret sharing?
E" 'opyright protection
F" etc"
Model for 'et/ork Se%urity
8/17/2019 Cryptography Introduction BUP
65/71
y
A Model for 'et/ork Se%urity
8/17/2019 Cryptography Introduction BUP
66/71
y
3sing this model re+uires us to)5. Design a suitable algorithm for the se%urity
transformation=. Benerate the se%ret information 1keys2 used by the
algorithm-. De#elop methods to distribute and share the se%retinformation
:. Spe%ify a proto%ol enabling the prin%ipals to use thetransformation and se%ret information for a se%urityser#i%e
'et/ork A%%ess Se%urity Model
8/17/2019 Cryptography Introduction BUP
67/71
y
A Model for 'et/ork A%%ess
8/17/2019 Cryptography Introduction BUP
68/71
A Model for 'et/ork A%%ess
Se%urity
3sing this model re+uires us to)5. Sele%t appropriate gatekeeper fun%tions to identify users=. (mplement se%urity %ontrols to ensure only authoried
users a%%ess designated information or resour%es
3n/anted A%%ess
8/17/2019 Cryptography Introduction BUP
69/71
"la%ement in a %omputersystem of logi% that exploits
#ulnerabilities in the system
and that %an affe%t appli%ation
programs as /ell as utilityprograms
standards
8/17/2019 Cryptography Introduction BUP
70/71
'(ST
'ational (nstitute of
Standards and Te%hnology
3.S. federal agen%y that
deals /ith measurement
s%ien%e! standards! andte%hnology related to 3.S.
go#ernment use and to the
promotion of 3.S. pri#ate0
se%tor inno#ation
'(ST 9ederal (nformation
"ro%essing Standards 19("S2
and Spe%ial "ubli%ations 1S"2
ha#e a /orld/ide impa%t
(S$C
(nternet So%iety
"rofessional membership so%iety
/ith /orld/ide organiational and
indi#idual membership
"ro#ides leadership in addressing
issues that %onfront the future of the
(nternet(s the organiation home for the
groups responsible for (nternet
infrastru%ture standards! in%luding
the (nternet @ngineering Task 9or%e
1(@T92 and the (nternet Ar%hite%ture
,oard 1(A,2(nternet standards and related
spe%ifi%ations are published as
Re+uests for Comments 1R9Cs2
Summary
8/17/2019 Cryptography Introduction BUP
71/71
Computer se%urity
%on%eptsDefinition
@xamples
Challenges
The $S( se%urityar%hite%ture
Se%urity atta%ks
"assi#e atta%ks
A%ti#e atta%ks
Se%urity ser#i%es
Authenti%ation A%%ess %ontrol
Data %onfidentiality
Data integrity
'onrepudiation A#ailability ser#i%e
Se%urity me%hanisms
Model for net/ork
se%urity
Standards