Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Access Control Methodologies
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Security Awareness: Applying Practical Security in Your World
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Operating Systems Protection & Security.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Cryptography, Authentication and Digital Signatures
Lec. 5 : History of Cryptologic Research II
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Information Systems Control & Audit(9) Shin, SooJung Based on Ron’s book.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
PART VII Security.
ONLINE SECURE DATA SERVICE
DISSERTATION ON CRYPTOGRAPHY.
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Chapter 10 Boundary Controls

Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into codes

Transposition Ciphers Simple transposition rule is to swap the position of characters in consecutive pairs. For example: Peace is our objective is coded as Epca Esio Ruo Jbceitev

Substitution Ciphers Simple rule: hide identity of characters by replacing them with another character according to some rule For example: Letters:ABCDEFGHIJKLMNOP Code:IDEOGRAPHYBCFJKL GOOD DOG will be AKKO OKA

Product Cipher Product Cipher: Combination of substitution and transposition Better than both and resistant to cryptanalysis The remaining discussion assumes product cipher

Choosing a Cipher System Cipher System has two components –(1) an encipherment method or algorithm that constitutes the basic cryptographic technique –(2) a cryptographic key upon which the algorithm operates in conjunction with cleartext to produce ciphertext

5 Desirable Properties of a Cipher System (1) High work factor (difficult to break) (2) Small key (can be changed frequently) (3) Simplicity (too complex = too costly) (4) Low error propagation (if chained encryption is used) (5) Little expansion of message size (avoid stats pkg to identify patterns of letters)

Private Key vs. Public Key Parties should share the same key at both ends. This make it difficult for business applications, thought it might be good for military purposes. Private key is slow So, we need Public Key Cryptosystems –Different keys to encrypt and decrypt

Key Management Key generation Key distribution Key installation

Key Generation 3 Questions when performing the key- generation function: –(1) What keys must be generated? (key for PIN is different from key for other part of transaction ) –(2) How should these keys be generated? (a complete random process) –(3) How long must the keys be? (trade off between risk and overhead, 90-bit key is good)

Key Distribution Different place than where was generated Physically carry the key or part of it

Key Installation Setting switches Turning dials Keypad to a temp storage Use of special command to link all and make it a workable key No wire tap between keypad and cryptographic facility

Access Controls Restrict use of computer system resources to authorized users Limit actions authorized users can take with these resources Ensure the users obtain only authentic computer system resources Are part of Op Sys or special software

Identification & Authentication Users can provide 3 classes of authentication information: –Remembered information (name, account) –Possessed objects (Badge, card) –Personal characteristics (finger print)

Object Resources Resources users seek to employ in a computer-based information system can be classified into 4 types: –Hardware –Software –Commodities –Data

What is a good password? Make one now See page 381

Action Privilages Read –Direct read –Statistical read Add –Insert –Append Modify

Access Control Policies Two Types: (1) Discretionary -users can choose to share files with other users if they wish (2) Mandatory -both users and resources are assigned fixed security attributes

Implementing Access Control Mechanism Open vs. Closed Environment –OPEN: users have all access unless authorization data specifies otherwise –CLOSED: users cannot access resources unless they have been assigned the necessary action privileges

Approaches to Authorization Two alternatives: (1) a “ticket-oriented” approach (2) a “list-oriented” approach

PIN Generation & Advantages Derived PIN –PIN need not be stored Random PIN –PIN not tied to an account number Customer-selected PIN –PIN is easy to remember

PIN Issuance & Delivery Mail Solicitation Telephone Solicitation PIN entry via a secure terminal PIN entry at the issuer’s facility

PIN Validation Local PIN Validation –online or offline modes Interchange PIN Validation –transmission –processing –storage –change

Plastic Cards Application for the Card Preparation of the Card –embossing name, account number, exp date Issue of the Card –ensure cards arrives safely to user Use of the Card –controls seek to ensure that users safeguard their cards