55
Information Security Prepared By: Prof. Ajaykumar T. Shah http://

Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Embed Size (px)

Citation preview

Page 1: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Information Security

Prepared By: Prof. Ajaykumar T. Shahhttp://aforajayshahnirma.wordpress.com

Page 2: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Security Attack

Passive Attack Active Attack

A passive attack attempts to learn or make use of information from the system but does not affect system resources.

An active attack attempts to alter system resources or affect their operation.

Aforajayshahnirma.wordpress.com

Page 3: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

The goal of the opponent is to obtain information that is being transmitted.Two types of passive attacks are

1. The release of message contents 2. Traffic analysis.

The release of message contents is easily understood. A telephone conversation, an electronic mail message, and a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.

Passive Attack

Aforajayshahnirma.wordpress.com

Page 4: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Release of Message Content

Aforajayshahnirma.wordpress.com

Page 5: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Traffic Analysis

A second type of passive attack, traffic analysis. Suppose that we had a way of masking the contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message.

The common technique for masking contents is encryption.

An opponent might still be able to observe the pattern of these messages.

The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged.

Aforajayshahnirma.wordpress.com

Page 6: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

http://aforajayshahnirma.wordpress.com

Traffic Analysis

Page 7: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Passive attacks are very difficult to detect, because they do not involve any alteration of the data.

Typically, the message traffic is sent and received in an apparently normal fashion, and neither the sender nor receiver is aware that a third party has read the messages or observed the traffic pattern.

However, it is feasible to prevent the success of these attacks, usually by means of encryption. Thus, the emphasis in dealing with passive attacks is on prevention rather than detection.

Passive Attack

http://aforajayshahnirma.wordpress.com

Page 8: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Active Attack

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories:

1. Masquerade 2. Replay3. Modification of messages 4. Denial of service.

http://aforajayshahnirma.wordpress.com

Page 9: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Active Attack Masquerade

http://aforajayshahnirma.wordpress.com

Page 10: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Active Attack Replay

http://aforajayshahnirma.wordpress.com

Page 11: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Active Attack Modification of Message

http://aforajayshahnirma.wordpress.com

Page 12: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Active Attack Denial of Service

http://aforajayshahnirma.wordpress.com

Page 13: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Model for N/w Security

http://aforajayshahnirma.wordpress.com

Page 14: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Model for N/w Security

This general model shows that there are four basic tasks in designing a particular security service:

1. Design an algorithm for performing the security-related transformation.

2. Generate the secret information to be used with the algorithm.

3. Develop methods for the distribution and sharing of the secret information.

4. Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service.

http://aforajayshahnirma.wordpress.com

Page 15: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Model for N/w Security

http://aforajayshahnirma.wordpress.com

Page 16: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

• An original message is known as the plain text.• The coded message is called the cipher text. • The process of converting from plaintext to cipher text is

known as enciphering or encryption.• Restoring the plaintext from the cipher text is deciphering or

decryption. • The many schemes used for encryption constitute the area of

study known as cryptography. Such a scheme is known as a cryptographic system or a cipher.

• Techniques used for deciphering a message without any knowledge of the enciphering details fall into the area of cryptanalysis.

• The areas of cryptography and cryptanalysis together are called cryptology.

Basic Terms

http://aforajayshahnirma.wordpress.com

Page 17: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Symmetric Cipher Model

http://aforajayshahnirma.wordpress.com

Page 18: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Model of Symmetric Cryptosystem

http://aforajayshahnirma.wordpress.com

Page 19: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Cryptography

1. The type of operations used for transforming plaintext to cipher text.

I. SubstitutionII. Transposition

2. The number of keys used.I. If both key are same – symmetricII. If both key are different – asymmetric

3. The way in which the plaintext is processed.I. Block CipherII. Stream Cipher

http://aforajayshahnirma.wordpress.com

Page 20: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Typically, the objective of attacking an encryption system is to recover the key in use rather than simply to recover the plaintext of a single cipher text. There are two general approaches to attacking a conventional encryption scheme:

• Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plain text–cipher text pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

http://aforajayshahnirma.wordpress.com

Page 21: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

http://aforajayshahnirma.wordpress.com

Page 22: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

• Brute-force attack: The attacker tries every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

http://aforajayshahnirma.wordpress.com

Page 23: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Substitution Techniques

Caeser CipherMono-alphabetic CipherPlayfair CipherHill CipherPoly-alphabetic Cipher

http://aforajayshahnirma.wordpress.com

Page 24: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Caeser Cipher

Julius Caesar.The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet.

http://aforajayshahnirma.wordpress.com

Page 25: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Caeser Cipher cont…

http://aforajayshahnirma.wordpress.com

Page 26: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Caeser Cipher cont…

If it is known that a given cipher text is a Caesar cipher, then a brute-force cryptanalysis is easily performed: simply try all the 25 possible keys.

Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis:

I. The encryption and decryption algorithms are known.II. There are only 25 keys to try.III. The language of the plaintext is known and easily

recognizable.

http://aforajayshahnirma.wordpress.com

Page 27: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

http://ajpatelit.hpage.com

Page 28: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Monoalphabetic Cipher

With only 25 possible keys, the Caesar cipher is far from secure. A dramatic increase in the key space can be achieved by allowing an arbitrary substitution. Before proceeding, we define the term permutation. A permutation of a finite set of elements is an ordered sequence of all the elements of, with each element appearing exactly once.

For Example if S={a , b , c } there are six permutations of S:

http://aforajayshahnirma.wordpress.com

Page 29: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Monoalphabetic Cipher cont…

Cipher Text

Frequency of all char in the cipher text.

http://aforajayshahnirma.wordpress.com

Page 30: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

http://ajpatelit.hpage.com

Monoalphabetic Cipher cont…

Page 31: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Monoalphabetic Cipher cont…

http://aforajayshahnirma.wordpress.com

Page 32: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Playfair Cipher

The Playfair algorithm is based on the use of a 5 × 5 matrix of letters constructed using a keyword.

Key: monarchy

http://aforajayshahnirma.wordpress.com

Page 33: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Playfair Cipher cont…

The letters I and J count as one letter. Plaintext is encrypted twoletters at a time, according to the following rules:I. Repeating plaintext letters that are in the same pair are separated with a

filler letter, such as x, so that balloon would be treated as ba lx lo on.II. Two plaintext letters that fall in the same row of the matrix are each

replaced by the letter to the right, with the first element of the row circularly following the last. For example, ar is encrypted as RM.

III. Two plaintext letters that fall in the same column are each replaced by the letter beneath, with the top element of the column circularly following the last. For example, mu is encrypted as CM.

IV. Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and the column occupied by the other plaintext letter. Thus, hq becomes YP and ea becomes IM (or JM, as the encipherer wishes).

http://aforajayshahnirma.wordpress.com

Page 34: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Playfair Cipher cont…

Key: secret S E C R T

A B D F G

H I/J K L M

N O P Q U

V W X Y Z

Input Text: come to office co me to of fi ce

Cipher Text: EP IT EU QB BL RC

http://aforajayshahnirma.wordpress.com

Page 35: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Hill Cipher

Developed by the mathematician Lester Hill in 1929.

This encryption algorithm takes m successive plaintext letters and substitutes for them m cipher text letters. The substitution is determined by m linear equations in which each character is assigned a numerical value (a=0, b=1, … z=25). For , m=3 the system can be described as

http://aforajayshahnirma.wordpress.com

Page 36: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Hill Cipher cont…

OR

where C and P are row vectors of length 3 representing the plaintext and cipher text, and K is a 3 * 3 matrix representing the encryption key. Operations are performed mod 26.

http://aforajayshahnirma.wordpress.com

Page 37: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Hill Cipher cont…

Plaintext: paymoremoney

Key: = (303 303 531)

The first three letters of the plaintext are represented by the vector (15 0 24).

Then (15 0 24) K = (303 303 531) mod 26 = (17 17 11) = RRL .

Continuing in this fashion, the cipher text for the entire plaintext is RRLMWBKASPDH.

Page 38: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Hill Cipher cont…

KK-1 =

=

Page 39: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Hill Cipher cont…

http://aforajayshahnirma.wordpress.com

Page 40: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Polyalphabetic Cipher

VIGENERE CIPHERWe can express the Vigenère cipher in the following manner. Assume a sequence of plaintext letters P = p0, p1, p2, ... , pn-1 and a key consisting of the sequence of letters K = k0, k1, k2, ... , km-1 , where typically m < n. The sequence of Cipher text letters C = C0, C1, C2, ... , Cn-1 is calculated as follows:

Page 41: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

http://ajpatelit.hpage.com

Polyalphabetic Ciphercont…

Page 42: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Polyalphabetic Ciphercont…

http://aforajayshahnirma.wordpress.com

Page 43: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

The periodic nature of the keyword can be eliminated by using a nonrepeating keyword that is as long as the message itself. Vigenère proposed what is referred to as an autokey system, in which a keyword is concatenated with the plaintext itself to provide a running key. For our example,

Polyalphabetic Ciphercont…

http://aforajayshahnirma.wordpress.com

Page 44: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

VERNAM CIPHER

AT&T engineer named Gilbert Vernam in 1918.His system works on binary data (bits) rather than letters.

Polyalphabetic Ciphercont…

http://aforajayshahnirma.wordpress.com

Page 45: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Polyalphabetic Cipher cont…

http://aforajayshahnirma.wordpress.com

Page 46: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Difference

MONOALPHABETIC CIPHER POLYALPHABETIC CIPHER

Once the key is chosen each alphabetic character of a plain text is mapped onto a UNIQUE alphabetic character of a cipher text.

Each alphabetic character of a plaintext can be mapped onto ‘m’ alphabetic characters of a ciphertext.

The relationship between a character in the plaintext and the character in the ciphertext is one to one.

The relationship between a character in the plaintext and the character in the ciphertext is one to many.

A stream cipher is a monoalphabetic cipher if the value of ki does not depend on the position of the plaintext character in the plaintext stream.

A stream cipher is a polyalphabetic cipher if the value of ki does depend on the position of the plaintext character in the plaintext stream.

Monoalphabetic cipher includes additive, multiplication, affine and monoalphabetic substitution cipher.

Polyalphabetic cipher includes autokey, playfair, vigenere, Hill, one time pad, roter and Enigma cipher.

http://aforajayshahnirma.wordpress.com

Page 47: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

One-Time Pad

An Army Signal Corp officer, Joseph Mauborgne, proposed an improvement to the Vernam cipher that yields the ultimate in security. Mauborgne suggested using a random key that is as long as the message, so that the key need not be repeated. Inaddition, the key is to be used to encrypt and decrypt a single message, and then is discarded. Each new message requires a new key of the same length as the new message. Such a scheme, known as a one-time pad, is unbreakable.

http://aforajayshahnirma.wordpress.com

Page 48: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

One-Time Pad cont…

The one-time pad offers complete security but, in practice, has two fundamental difficulties:

I. There is the practical problem of making large quantities of random keys. Any heavily used system might require millions of random characters on a regular basis. Supplying truly random characters in this volume is a significant task.

II. Even more daunting is the problem of key distribution and protection. For every message to be sent, a key of equal length is needed by both sender and receiver. Thus, a mammoth key distribution problem exists.

http://aforajayshahnirma.wordpress.com

Page 49: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Transposition Techniques

RAIL FENCE

The simplest such cipher is the rail fence technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.

PLAIN TEXT: meet me after the toga party

m e m a t r h t g p r y e t e f e t e o a a t

CIPHER TEXT: mematrhtgpryetefeteoaat

http://aforajayshahnirma.wordpress.com

Page 50: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Transposition Techniques cont…

This sort of thing would be trivial to cryptanalyze. A more complex scheme is to write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns. The order of the columns then becomes the key to the algorithm. For example,

http://aforajayshahnirma.wordpress.com

Page 51: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

A plaintext message may be hidden in one of two ways. The methods of steganography conceal the existence of the message, whereas the methods of cryptography render the message unintelligible to outsiders by various transformationsof the text.

Steganography

http://aforajayshahnirma.wordpress.com

Page 52: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Steganography cont…

Steganography

Protection Against Detection

Protection Against Removal

Watermarking

Fingerprinting

Covered writing, Covert channels

Data Hiding

Documentmarking

All object are marked in the same way

Identify all object, every object is marked specified

http://aforajayshahnirma.wordpress.com

Page 53: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

Steganography cont…

STEGANOGRAPHY TECHNIQUES

I. Genome SteganographyII. Hiding in textIII. Hiding in the disk spaceIV. Hiding data in software and circuitryV. Information hiding in ImagesVI. Hiding in the network packets.

http://aforajayshahnirma.wordpress.com

Page 54: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system
Page 55: Security Attack Passive Attack Active Attack A passive attack attempts to learn or make use of information from the system but does not affect system

End of the Unit-1

http://aforajayshahnirma.wordpress.com