Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, 2013 2:00 am via dropbox Last day to submit with 4%/day penalty:

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
Cryptography and Network Security Chapter 1
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Lecture 1 Introduction Basic Security Concepts
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Lecture 1 1. Introduction 2. Basic Security Concepts.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Network security Network security. Look at the surroundings before you leap.
Cryptography Lynn Ackler Southern Oregon University.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Overview of Cryptography & Its Applications
Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.
CSCE 548 Secure Software Development Security Operations.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Cyber Attacks and Cryptography Overview
Network Security Introduction
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Network Security Celia Li Computer Science and Engineering York University.
Introduction to Network Systems Security Mort Anvari.
CSCE 548 Introduction Basic Security Concepts. APOGEE Students Download recorded lectures Contact instructor if needed via – Phone: during office hours.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cyber Attacks Cryptography Terminology Secret-Key Encryption
Lecture 1 Introduction Basic Security Concepts
Data & Network Security
Cryptography.
Information and Network Security
Basic of Modern Cryptography
Computer Security Chapter Two
Basic Security Concepts
Presentation transcript:

Lecture 3 Basic Security Concepts cont.

Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty: September 23, :00 am via dropbox From C. P. Pfleeger and S. L. Pfleeger: Security in Computing, 4 th Edition answer the following questions:  Chapter 1: 1, 10, 15  Chapter 2: 13, 18, 34 Grading: Answer all of the questions. Only one of them will be chosen by the instructor to be graded. Solutions for all questions will be posted online and discussed in class after the last day to submit date. CSCE Farkas 2

3 Research Project Project information: /project-2013.htm /project-2013.htm Step 1  Identifying research interest  Form groups of 2-4 students

CSCE Farkas Project Information Discussion on Student preferences  What do you like to work on? E.g., application development, operating systems, databases, hardware design, robotics, game development, etc.  What are the security problems in your area of interest? E.g., multilevel secure operating systems, access control in databases, remote controlled robots, etc.  How much your group can do within 1 semester? E.g., need to choose a problem that can be addressed within 12 weeks (including any background research, research, development, and writing reports)  Be as specific as possible! 4

CSCE Farkas 5 Types of Attacks (1)  Interruption – an asset is destroyed, unavailable or unusable (availability)  Interception – unauthorized party gains access to an asset (confidentiality)  Modification – unauthorized party tampers with asset (integrity)  Fabrication – unauthorized party inserts counterfeit object into the system (authenticity)  Denial – person denies taking an action (authenticity)

CSCE Farkas 6 Types of Attacks (2)  Passive attacks:  Eavesdropping  Monitoring  Active attacks:  Masquerade – one entity pretends to be a different entity  Replay – passive capture of information and its retransmission  Modification of messages – legitimate message is altered  Denial of service – prevents normal use of resources

Malicious Attacks M ethod: skills, knowledge, tools, information, etc. O pportunity: time and access M otive: reason to perform the action How can defense influence these aspects of attacks? CSCE Farkas 7

8 Computer Criminals Amateurs: regular users, who exploit the vulnerabilities of the computer system  Motivation: easy access to vulnerable resources Crackers: attempt to access computing facilities for which they do not have the authorization  Motivation: enjoy challenge, curiosity Career criminals: professionals who understand the computer system and its vulnerabilities  Motivation: personal gain (e.g., financial)

CSCE Farkas 9 Lecture 1 Methods of Defense Prevent: block attack Deter: make the attack harder Deflect: make other targets more attractive Detect: identify misuse Tolerate: function under attack Recover: restore to correct state

CSCE Farkas 10 Information Security Planning Organization Analysis Risk management Mitigation approaches and their costs Security policy Implementation and testing Security training and awareness

CSCE Farkas 11 Risk Management Framework (Business Context) Understand Business Context Identify Business and Technical Risks Synthesize and Rank Risks Define Risk Mitigation Strategy Carry Out Fixes and Validate Measurement and Reporting

Cryptography 1 Project Topics Cyber Attacks Cryptography Terminology Secret-Key Encryption

CSCE Farkas 13 Reading Assignment Reading assignments for this lecture Required:  Pfleeger: Ch 2 Recommended:  C. Dupuis, A Short History of Cryptography,  Navajo Code Talkers: World War II Fact Sheet, Interesting:  U.S. always ends up regulating new technologies for public safety; the Internet is no exception, Homeland Security News Wire, up-regulating-new-technologies-for-public-safety-the-internet-is-no-exception, 08/29/ up-regulating-new-technologies-for-public-safety-the-internet-is-no-exception

CSCE Farkas 14 Insecure communications Sender Snooper Recipient Insecure channel Confidential

CSCE Farkas 15 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it  Only the recipient should get it  Proof of the sender’s identity  Message shouldn’t be corrupted in transit  Message should be sent/received once only

CSCE Farkas 16 Terminology  Plaintext (cleartext): a message in its original form  Ciphertext (cyphertext): an encrypted message  Encryption: transformation of a message to hide its meaning  Cipher: cryptographic algorithm. A mathematical function used for encryption (encryption algorithm) and decryption (decryption algorithm).

CSCE Farkas 17 Terminology  Decryption: recovering meaning from ciphertext  Cryptography: art and science of keeping messages secure  Cryptanalysis: art and science of breaking ciphertext  Cryptology: study of both cryptography and cryptanalysis

CSCE Farkas 18 Encryption and Decryption Plaintext EncryptionDecryption Ciphertext Additional requirements : Authentication Between communicating parties Third-party authentication Non-repudiation Integrity verification Key distribution Secret key (secure distribution) Public key (reliable distribution)

CSCE Farkas 19 Conventional (Secret Key) Cryptosystem Encryption Decryption Plaintext Ciphertext K SenderRecipient C=E(K,M) M=D(K,C) K needs secure channel

CSCE Farkas 20 Public Key Cryptosystem Encryption Decryption Plaintext Ciphertext SenderRecipient C=E(K pub,M) M=D(K priv,C) Recipient’s public Key (K pub ) Recipient’s private Key (K priv ) K pub needs reliable channel

Security Objectives Confidentiality Integrity Availability Authenticity Non-repudiation CSCE Farkas 21 How can cryptography support these objectives?

CSCE Farkas 22 Security Objectives Confidentiality: Hiding message/file content Secret key, public key encryption Integrity: Detecting modification Hash function Availability: Not much – hiding existence of data Secret key, public key encryption Authenticity: Verify origin Public key encryption Non-repudiation: Verify activity Public key encryption CSCE Farkas 22

CSCE Farkas 23 Cryptanalysis Cryptanalyst’s goal:  Break message  Break key  Break algorithm

CSCE Farkas 24 Taxonomy of Attacks Ciphertext-only attack: attacker has ciphertext for messages encrypted with K. Deduce keys and/or plaintext messages. Known plaintext attack: attacker additionally knows the plaintext of the messages. Deduce keys or a decryption algorithm. Chosen plaintext attack: attacker can obtain the ciphertext for selected plaintext messages. Deduce as above. Chosen ciphertext attack: attacker can obtain decrypted (plaintext) versions of selected ciphertext. Deduce as above.

CSCE Farkas 25 Breakable versus Practically breakable Unconditionally secure: impossible to decrypt. No amount of ciphertext will enable a cryptanalyst to obtain the plaintext Computationally secure: an algorithm that is not breakable in practice based on worst case scenario Breakable: all algorithms (except one-time pad) are theoretically breakable

CSCE Farkas 26 What makes a good cryptosystem?  A good cryptosystem is one whose security does not depend upon the secrecy of the algorithm.  From Bruce Schneier:  “Good cryptographers rely on peer review to separate the good algorithms from the bad. ''

CSCE Farkas 27 Secret Key Cryptosystem Encryption Decryption Plaintext Ciphertext K SenderRecipient C=E(K,M) M=D(K,C) K needs secure channel

CSCE Farkas 28 Secret Key Cryptosystem Vulnerabilities (1 Passive Attacker (Eavesdropper) Obtain and/or guess key and cryptosystem use these to decrypt messages Capture text in transit and try a ciphertext- only attack to obtain plaintext.

CSCE Farkas 29 Active Attacker Break communication channel (denial of service) Obtain and/or guess key and cryptosystem and use these to send fake messages Secret Key Cryptosystem Vulnerabilities

CSCE Farkas 30 Inherent Weaknesses of Symmetric Cryptography  Key distribution must be done secretly (difficult when parties are geographically distant, or don't know each other)  Need a key for each pair of users  n users need n*(n-1)/2 keys  If the secret key (and cryptosystem) is compromised, the adversary will be able to decrypt all traffic and produce fake messages

CSCE Farkas 31 Basic Encryption Techniques Substitution Permutation Combinations and iterations of these

CSCE Farkas 32 Next Class  Substitution and Transposition  Characterization of good encryption algorithms