1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Introduction to Information Security Lecture 1: Introduction & Overview Prof. Kwangjo Kim.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Cryptography and Network Security
Introduction to Information Security Introduction & Overview
Information Security.
Cryptographic Hash Function
Information and Network Security
Cryptography and Network Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Introduction to Cryptography
Computer Security Chapter Two
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Presentation transcript:

1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…

2  Data  recording of “something” measured  Raw material, just measured  Information  Information is the result of processing, manipulating and organizing data in a way that adds to the knowledge of the receiver.  Processed data  Knowledge  Knowledge is normally processed by means of structuring, grouping, filtering, organizing or pattern recognition.  Highly structured information What is Information Security?

3  Information Systems  An integrated set of components for collecting, storing, processing, and communicating information.  Business firms, other organizations, and individuals in contemporary society rely on information systems to manage their operations, compete in the marketplace, supply services, and augment personal lives.  Information Revolution  A phrase we use to refer to the dramatic changes taking place during the last half of the 20th century in which service jobs based on information are more common than jobs in manufacturing or agriculture.  Information becomes more and more important than materials, resources.  Competitiveness comes from information  How much information do you have? What is Information Security?

4  Information Security ( 정보보안, 정보보호 )  Information security is the process of protecting information from unauthorized access, use, disclosure, destruction, modification, or disruption  The protection of computer systems and information from harm, theft, and unauthorized use.  Protecting the confidentiality, integrity and availability of information  Information security is an essential infrastructure technology to achieve successful information-based society  Highly information-based company without information security will lose competitiveness  What kind of protection?  Protecting important document / computer  Protecting communication networks  Protecting Internet  Protection in ubiquitous world  Privacy Protection on Cloud computing What is Information Security?

5  Cryptography : designing secure cryptosystems  Cryptography (from the Greek kryptós and gráphein, “to write”) was originally the study of the principles and techniques by which information could be concealed in ciphers and later revealed by legitimate users employing the secret key.  Cryptanalysis : analyzing the security of cryptosystems  Cryptanalysis (from the Greek kryptós and analýein, “to loosen” or “to untie”) is the science (and art) of recovering or forging cryptographically secured information without knowledge of the key.  Cryptology : science dealing with information security  Science concerned with data communication and storage in secure and usually secret form. It encompasses both cryptography and cryptanalysis. Cryptology = Cryptography + Cryptanalysis

6  Cryptography is a basic tool to implement information security  Security goals  Secrecy (confidentiality)  Authentication  Integrity  Non-repudiation  Verifiability  More application-specific security goals  Achieve these security goals using cryptography  Without cryptography …. ??? Cryptology

7 Secret Key vs. Public Key Systems  Symmetric Key Cryptosystem  Public Key Cryptosystem Plain Text Cipher Text Plain Text Key EncryptionDecryption Shared key Plain Text Cipher Text Plain Text Public Key Private Key EncryptionDecryption Receiver’s key

8 Common Terms (1)  Cryptography( 암호설계 ): The study of mathematical techniques related to aspects of information security  Cryptanalysis( 암호분석 ): The study of mathematical techniques for attempting to defeat cryptographic techniques  Cryptology( 암호학 ): The study of cryptography and cryptanalysis  Cryptosystem( 암호시스템 ): A general term referring to a set of cryptographic primitives used to provide information security  Symmetric key primitives; Public key primitives  Steganography: The method of concealing the existence of message  Cryptography is not the only means of providing information security, but rather one set of such techniques (physical / human security)

9 Common Terms (2)  Cipher: Block cipher, Stream cipher, Public key cipher  Plaintext/Cleartext ( 평문 ), Ciphertext ( 암호문 )  Encryption/Encipherment( 암호화 )  Decryption/Decipherment( 복호화 )  Key (or Cryptographic key)  Secret key  Private key / Public key  Hashing ( 해쉬 )  Authentication ( 인증 )  Message authentication  User authentication  Digital signature ( 전자서명 )

10 Attacks  Attacks  An efficient algorithm that, for a given cryptographic design, enables some protected elements of the design to be computed “substantially” quicker than specified by the designer.  Finding overlooked and realistic threats for which the design fails  Attacks on encryption algorithms  Exhaustive search (brute force attack)  Ciphertext-only attack  Known-plaintext attack  Chosen-plaintext attack  Chosen-ciphertext attack

11 Security Threats  Interruption/Denial of service  Interception: eavesdropping, wiretapping, theft …  Modification  Fabrication/Forgery  Unauthorized access  Denial of facts

12 Security Services  Security services  A service that enhances information security using one or more security mechanisms  Confidentiality/Secrecy ( 기밀성 )  Interception  Authentication ( 인증성 )  Forgery  Integrity ( 무결성 )  Modification  Non-repudiation ( 부인방지 )  Denial of facts  Access control ( 접근제어 )  Unauthorized access  Availability ( 가용성 )  Interruption

13 Security Needs for Network Communications Interception Confidentiality Is Private? Modification Integrity Has been altered? Forgery Authentication Who am I dealing with? Claim Non-Repudiation Who sent/received it? Not SENT ! Denial of Service Availability Wish to access!! Access Control Have you privilege? Unauthorized access

14 Security Mechanisms  Security mechanism  A mechanism designed to detect, prevent, or recover from a security attack  Encryption  Authentication  Digital signature  Key exchange  Access control  Monitoring & Responding

15 Models for Evaluating Security  Conditional vs. Unconditional Security  Unconditional security  Computational security  Provable vs. Ad hoc Security  Provable security  Ad hoc security