2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CPE 5002 Network security. Look at the surroundings before you leap.
Steganography Rayan Ghamri.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Introduction (Pendahuluan)  Information Security.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography and Network Security
Information Security Principles (ESGD4222)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Digital Steganography
Cryptography, Authentication and Digital Signatures
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Network security Network security. Look at the surroundings before you leap.
Cryptography Lynn Ackler Southern Oregon University.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty:
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.
Information Security in Distributed Systems Distributed Systems1.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Network Security Celia Li Computer Science and Engineering York University.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography – Test Review
Cryptography and Network Security
Introduction to Steganography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptographic Hash Function
Cryptography And Network Security
Data & Network Security
CNET334 - Network Security
Cryptography.
Encryption
Information and Network Security
Steganography.
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Cryptography : Introduction
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptanalysis Network Security.
Cryptography and Network Security
Security Attacks Network Security.
Presentation transcript:

2 nd lecture

 Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity – Non-repudiation – Confidentiality – Availability.  Symmetric algorithms – public-key (asymmetric) algorithms.

3 Interruption  This is an attack on availability.  An asset of the system is destroyed or becomes unusable.Interruption  This is an attack on availability.  An asset of the system is destroyed or becomes unusable. Information source Information Destination Information Interruption Categories of security attacks Interception Modification Fabrication

4 Interruption  Examples include:  destruction of a piece of hardware such as a hard disk,  the cutting of a communication line, or  the disabling of the file management system.Interruption  Examples include:  destruction of a piece of hardware such as a hard disk,  the cutting of a communication line, or  the disabling of the file management system. Interruption Categories of security attacks Interception Modification Fabrication

5 Interception  This is an attack on confidentiality.  Unauthorized party ( person, program ) gains access to an asset.Interception  This is an attack on confidentiality.  Unauthorized party ( person, program ) gains access to an asset. Information source Information Destination Information Unauthorized Party Interruption Categories of security attacks Interception Modification Fabrication

6 Interception  Examples include:  wiretapping to capture data in a network, and  the unauthorized copying of files or programs.Interception  Examples include:  wiretapping to capture data in a network, and  the unauthorized copying of files or programs. Interruption Categories of security attacks Interception Modification Fabrication

7 Modification  This is an attack on integrity.  Unauthorized party gains access and tampers with an asset..Modification  This is an attack on integrity.  Unauthorized party gains access and tampers with an asset.. Information source Information Destination Information Unauthorized Party Interruption Categories of security attacks Interception Modification Fabrication

8 Modification  Examples include:  changing values in data files,  altering a program so that it performs differently and  modifying the content of messages being transmitted in a network.Modification  Examples include:  changing values in data files,  altering a program so that it performs differently and  modifying the content of messages being transmitted in a network. Interruption Categories of security attacks Interception Modification Fabrication

9 Fabrication  This is an attack on authenticity.  Unauthorized party inserts counterfeit objects into system.Fabrication  This is an attack on authenticity.  Unauthorized party inserts counterfeit objects into system. Information source Information Destination Unauthorized Party Interruption Categories of security attacks Interception Modification Fabrication

10 Fabrication  Examples include:  the insertion of spurious messages in a network or  the addition of records to a file.Fabrication  Examples include:  the insertion of spurious messages in a network or  the addition of records to a file. Interruption Categories of security attacks Interception Modification Fabrication

11 Passive threats  Passive attacks are in the nature of eavesdropping or monitoring of transmissions.  The goal is to obtain information that is being transmitted.  Passive attacks are very difficult to detect because they do not involve any alteration of the data. Passive threats  Passive attacks are in the nature of eavesdropping or monitoring of transmissions.  The goal is to obtain information that is being transmitted.  Passive attacks are very difficult to detect because they do not involve any alteration of the data. Passive Categories of security threats Active

12 Two types of Passive threats  The release of message contents such as a telephone conversation, an message, and a transferred file.  The traffic analysis to determine the location and identity of communicating hosts. Two types of Passive threats  The release of message contents such as a telephone conversation, an message, and a transferred file.  The traffic analysis to determine the location and identity of communicating hosts. Passive Categories of security threats Active

The attacker does not affect the protocol Eve

14 Active threats  Active attacks involve some modification of the data stream or the creation of a false stream.  These attacks can be subdivided into four categories: masquerade, reply, modification of messages, and denial of service. Active threats  Active attacks involve some modification of the data stream or the creation of a false stream.  These attacks can be subdivided into four categories: masquerade, reply, modification of messages, and denial of service. Passive Categories of security threats Active

Mallory

 The aim of cryptography is to keep the plaintext secret from the eavesdroppers.  Adversary – attacker – intruder – interceptor – interloper – enemy.  Eavesdroppers are assumed to have complete access to the communication between the sender and receiver.  Cryptanalysis is the science of recovering the plaintext from the message without access to the key.

 There are common 5 types of cryptanalytic attacks. 1. Ciphertext-only attack: the cryptanalyst has the ciphertext of several messages that are encrypted using the same algorithm. Given: C 1 =E k (M 1 ), C 2 =E k (M 2 ), …, C i =E k (M i ) Deduce: M 1, M 2, …, M i to infer M i+1 from C i+1

2. Known-plaintext attack: the cryptanalyst has access not only to the ciphertext of several messages, but also to the plaintext of those messages. His job is to deduce the key. Given: M 1, C 1 =E k (M 1 ), M 2, C 2 =E k (M 2 ), …, M i, C i =E k (M i ) Deduce: k to infer M i+1 from C i+1

3. Chosen-plaintext attack: the cryptanalyst not only has access to the ciphertext and associated plain text of several messages, but he also chooses the plaintext that gets encrypted. His job is to deduce the key. Given: M 1, C 1 =E k (M 1 ), M 2, C 2 =E k (M 2 ), …, M i, C i =E k (M i ) where the cryptanalyst chooses M 1, M 2, …, M i Deduce: k to infer M i+1 from C i+1

4. Adaptive chosen-plaintext attack: Not only can the cryptanalyst choose the plaintext that is encrypted, but he can also modify his choice based on the results of previous encryption.

5. Chosen-ciphertext attack: The cryptanalyst can choose different ciphertexts to be decrypted and has access to the decrypted plaintext. Hids job is to deduce the key. Given: C 1, M 1 =D k (C 1 ), C 2, M 2 =D k (C 2 ), …, C i, M i =D k (C i ) Deduce: K

 The security of any algorithm depends on how hard it is to break.  An algorithm is:  Unconditionally secure: if there is not enough information to recover the plaintext.  Computationally secure: if it cannot be broken with the available resources, either current or future.  Brute-force attack: trying every possible key one by one and checking whether the resulting plaintext is meaningful.

 The complexity of an attack can be measured by:  Data complexity: the amount of data needed as an input to the attack.  Processing complexity: The time needed to perform the attack (work factor)  Storage requirements: the amount of memory needed to do the attack. Ex: a key length = 128 bit. If we have 1 million processor, each performs 1 million operation/second. We need years to recover the key.

 Steganography  from the Greek word steganos meaning “ covered ”  and the Greek word graphie meaning “ writing ”  Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination.  Anyone else viewing the message will fail to know it contains hidden data.

 Invisible Ink is a form of steganography  By replacing the least significant bit if each byte of the image with the bits of the message, we can store 64Kbyte message in a 1024 X 1024 gray scale picture.

Steganography Carrier Files  bmp  jpeg  gif  wav  mp3  Amongst others …

Steganography Tools  Steganos  S-Tools (GIF, JPEG)  StegHide (WAV, BMP)  Invisible Secrets (JPEG)  JPHide  Camouflage  Hiderman The following example come from S-Tools for Windows. S-Tools allows users to hide information into BMP, GIF, or WAV files.

FIGURE 2. The original image file (left) and image file with embedded text (right), side by side.

Image of a tree. By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in the image below.bitscolor component Image extracted from above image.

Identification of hidden files

 Definition  Identifying the existence of a message  Not extracting the message  Note: Technically, Steganography deals with the concealment (hiding) of a message, not the encryption of it  Steganalysis essentially deals with the detection of hidden content

 By identifying the existence of a hidden message, perhaps we can identify the tools used to hide it.  If we identify the tool, perhaps we can use that tool to extract the original message.

 Methods of detecting the use of Steganography  Visual Detection (JPEG, BMP, GIF, etc.)  Audible Detection (WAV, MPEG, etc.)  Statistical Detection (changes in patterns of the pixels or LSB – Least Significant Bit) or Histogram Analysis  Structural Detection - View file properties/contents  size difference  date/time difference  contents – modifications  checksum

 Categories  Anomaly  Histogram analysis  Change in file properties  Statistical Attack  Visually  Audible  Signature  A pattern consistent with the program used

 Detecting Steganography by viewing it  Can you see a difference in these two pictures? (I can ’ t!)

 Kurtosis  The degree of flatness of a curve describing a frequency of distribution.

 Histogram analysis can be used to possibly identify a file with a hidden message

 By comparing histograms, we can see this histogram has a very noticeable repetitive trend.

 Compare the properties of the files  Properties  04/04/ :25p 240,759 helmetprototype.jpg  04/04/ :26p 235,750 helmetprototype.jpg  Checksum  C:\GNUTools>cksum a:\before\helmetprototype.jpg a:\before\helmetprototype.jpg  C:\GNUTools>cksum a:\after\helmetprototype.jpg a:\after\helmetprototype.jpg

 If you have a copy of the original file, it can be compared to the modified carrier file.  Many tools can be used for viewing and comparing the contents of a hidden file.  Reviewing multiple files may identify a signature pattern related to the Steganography program