MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Internet Protocol Security (IP Sec)
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Crytography Chapter 8.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Principles of Information Security, 2nd edition2 Learning Objectives Upon completion of this material, you should be able to:  Describe the most significant.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Cryptography.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Chapter 20: Network Security Business Data Communications, 4e.
Cipher Methods Plaintext can be encrypted through bit stream or block cipher method Bit stream: each plaintext bit transformed into cipher bit one bit.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Linux Networking and Security Chapter 8 Making Data Secure.
Principles of Information Security, Fifth Edition
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Nine Encryption-The Foundation for the Virtual Private Network.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSecurity.
Basics of Cryptography
Cryptography Principles of Information Security, 2nd edition
Cryptography and Network Security
Computer Communication & Networks
Remote Access Lecture 2.
Secure Sockets Layer (SSL)
Chapter 8 Network Security.
UNIT-5 Cryptography 1.Principles Of Cryptography
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Cryptography and Network Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Pooja programmer,cse department
Goals Introduce the Windows Server 2003 family of operating systems
Chapter 8 Network Security.
The Secure Sockets Layer (SSL) Protocol
Public-Key, Digital Signatures, Management, Security
Chapter 29 Cryptography and Network Security
Basic of Modern Cryptography
Fluency with Information Technology Lawrence Snyder
Cryptography and Network Security
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

CRYPTOGRAPHY Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Cryptography Encryption is the process of converting an original message into a form that cannot be understood by unauthorized individuals Cryptology, the science of encryption, encompasses two disciplines: cryptography and cryptanalysis Cryptography—from the Greek words kryptos, meaning “hidden,” and graphein, meaning “to write”—describes the processes involved in encoding and decoding messages so that others cannot understand them Cryptanalysis—from analyein, meaning “to break up”—is the process of deciphering the original message (or plaintext) from an encrypted message (or ciphertext), without knowing the algorithms and keys used to perform the encryption Management of Information Security, 5th Edition, © Cengage Learning

Encryption Definitions Algorithm: the mathematical formula or method used to convert an unencrypted message into an encrypted message Cipher: the transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components Ciphertext or cryptogram: the unintelligible encrypted or encoded message resulting from an encryption Management of Information Security, 5th Edition, © Cengage Learning

Encryption Definitions (cont.) Cryptosystem: the set of transformations necessary to convert an unencrypted message into an encrypted message Decipher: to decrypt or convert ciphertext to plaintext Encipher: to encrypt or convert plaintext to ciphertext Key: the information used in conjunction with the algorithm to create the ciphertext from the plaintext; it can be a series of bits used in a mathematical algorithm, or the knowledge of how to manipulate the plaintext Management of Information Security, 5th Edition, © Cengage Learning

Encryptions Definitions (cont.) Keyspace: the entire range of values that can possibly be used to construct an individual key Plaintext: the original unencrypted message that is encrypted and results from successful decryption Steganography: the process of hiding messages, usually within graphic images Work factor: the amount of effort (usually expressed in hours) required to perform cryptanalysis on an encoded message Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Common Ciphers In encryption, the most commonly used algorithms include three functions: substitution, transposition, and XOR In a substitution cipher, you substitute one value for another A monoalphabetic substitution uses only one alphabet A polyalphabetic substitution uses two or more alphabets Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Common Ciphers The transposition cipher (or permutation cipher) simply rearranges the values within a block to create the ciphertext This can be done at the bit level or at the byte (character) level In the XOR cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream XOR works simply, if the two values are the same, you get “0”; if not, you get “1” This process is reversible; that is, if you XOR the ciphertext with the key stream, you get the plaintext Management of Information Security, 5th Edition, © Cengage Learning

Book or Running Key Cipher Another method, used in the occasional spy movie, is the use of text in a book as the algorithm to decrypt a message The key relies on two components: Knowing which book to use Having a list of codes representing the page number, line number, and word number of the plaintext word Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Symmetric Encryption Each of the methods of encryption and decryption described requires that the same algorithm and key are used to both encipher and decipher the message This is known as private key encryption, or symmetric encryption In this approach to encryption, the same key—a secret key—is used to encrypt and decrypt the message Symmetric encryption methods are usually extremely efficient, requiring easily accomplished processing to encrypt or decrypt the message One challenge in symmetric key encryption is getting a copy of the key to the receiver, a process that must be conducted out-of-band to avoid interception Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Symmetric Encryption Management of Information Security, 5th Edition, © Cengage Learning

Asymmetric Encryption Asymmetric encryption, also known as public key encryption, uses two different keys, but related keys Either key can be used to encrypt or decrypt the message However, if Key A is used to encrypt the message, then only Key B can decrypt it; conversely, if Key B is used to encrypt a message, then only Key A can decrypt it This technique is most valuable when one of the keys is private and the other is public The problem with asymmetric encryption is that it requires four keys to hold a single conversation between two parties, and the number of keys grows geometrically as parties are added Management of Information Security, 5th Edition, © Cengage Learning

Asymmetric (Public Key) Encryption Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Signature When the asymmetric process is reversed—the private key encrypts a message, and the public key decrypts it—the fact that the message was sent by the organization that owns the private key cannot be refuted This nonrepudiation is the foundation of digital signatures Digital signatures are encrypted messages that are independently verified by a central facility (Registry) as authentic Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Signature A digital certificate is an electronic document, similar to a digital signature, attached to a file certifying that the file is from the organization it claims to be from and has not been modified from the original format A certificate authority (CA) is an agency that manages the issuance of certificates and serves as the electronic notary public to verify their origin and integrity Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Certificates Management of Information Security, 5th Edition, © Cengage Learning

Public Key Infrastructure Public key infrastructure (PKI) is the entire set of hardware, software, and cryptosystems necessary to implement public key encryption PKI systems are based on public key cryptosystems and include digital certificates and certificate authorities Common implementations of PKI include: Systems that issue digital certificates to users and servers Systems with computer key values to be included in digital certificates Tools for managing user enrollment, key generation, and certificate issuance Verification and return of certificates Key revocation services Other services associated with PKI that vendors bundle into their products Management of Information Security, 5th Edition, © Cengage Learning

Public Key Infrastructure PKI can increase the capabilities of an organization to protect its information assets by providing the following services: Authentication: Digital certificates in a PKI system permit individuals, organizations, and Web servers to authenticate the identity of each of the parties in an Internet transaction Integrity: A digital certificate demonstrates that the content signed by the certificate has not been altered while in transit Confidentiality: PKI keeps information confidential by ensuring that it is not intercepted during transmission over the Internet Authorization: Digital certificates issued in a PKI environment can replace user IDs and passwords, enhance security, and reduce some of the overhead required for authorization processes and controlling access privileges for specific transactions Nonrepudiation: Digital certificates can validate actions, making it less likely that customers or partners can later repudiate a digitally signed transaction, such as an online purchase Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Hybrid Systems Pure asymmetric key encryption is not widely used except in the area of certificates; instead, it is typically employed in conjunction with symmetric key encryption, creating a hybrid system The hybrid process in current use is based on the Diffie-Hellman key exchange method, which provides a way to exchange private keys using public key encryption without exposure to any third parties In this method, asymmetric encryption is used to exchange symmetric keys so that two organizations can conduct quick, efficient, secure communications based on symmetric encryption Diffie-Hellman provided the foundation for subsequent developments in public key encryption Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Hybrid Encryption Management of Information Security, 5th Edition, © Cengage Learning

Using Cryptographic Controls While modem cryptosystems can certainly generate unbreakable ciphertext, that is possible only when the proper key management infrastructure has been constructed and when the cryptosystems are operated and managed correctly For those organizations with the need and the capability to use cryptographic controls, they can be used to support several aspects of the business: Confidentiality and integrity of e-mail and its attachments Authentication, confidentiality, integrity, and nonrepudiation of e-commerce transactions Authentication and confidentiality of remote access through VPN connections A higher standard of authentication when used to supplement access control systems Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning E-Mail Security Secure Multipurpose Internet Mail Extensions (S/MIME) builds on the Multipurpose Internet Mail Extensions (MIME) encoding format by adding encryption and authentication via digital signatures based on public key cryptosystems Pretty Good Privacy (PGP) was developed by Phil Zimmerman and uses the International Data Encryption Algorithm (IDEA) cipher, a 128-bit symmetric key block encryption algorithm with 64-bit blocks for message encoding Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Securing the Web Secure Sockets Layer (SSL) Developed by Netscape in 1994 to provide security for e-commerce transactions Mainly relies on RSA for key transfer and on IDEA, DES, or 3DES for encrypted symmetric key-based data transfer Secure Hypertext Transfer Protocol (SHTTP) Provides secure e-commerce transactions as well as encrypted Web pages for secure data transfer over the Web, using different algorithms Management of Information Security, 5th Edition, © Cengage Learning

Securing the Web (cont.) Secure Shell (SSH) Provides security for remote access connections over public networks by using tunneling, authentication services between a client and a server Used to secure replacement tools for terminal emulation, remote management, and file transfer applications Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Securing the Web IP Security (IPSec) is the primary and now dominant cryptographic authentication and encryption product of the IETF’s IP Protocol Security Working Group IPSec combines several different cryptosystems: Diffie-Hellman key exchange for deriving key material between peers on a public network Public key cryptography for signing the Diffie-Hellman exchanges to guarantee the identity of the two parties Bulk encryption algorithms, such as DES, for encrypting the data Digital certificates signed by a CA to act as digital ID cards Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Securing the Web IPSec has two components: The IP Security protocol itself, which specifies the information to be added to an IP packet and indicates how to encrypt packet data The Internet Key Exchange, which uses asymmetric key exchange and negotiates the security associations Management of Information Security, 5th Edition, © Cengage Learning

Securing the Internet (cont.) IPSec works in two modes of operation: transport and tunnel In transport mode, only the IP data is encrypted—not the IP headers themselves; this allows intermediate nodes to read the source and destination addresses In tunnel mode, the entire IP packet is encrypted and inserted as the payload in another IP packet IPSec and other cryptographic extensions to TCP/IP are often used to support a virtual private network (VPN), a private, secure network operated over a public and insecure network Management of Information Security, 5th Edition, © Cengage Learning

Securing Authentication A final use of cryptosystems is to provide enhanced and secure authentication One approach to this issue is provided by Kerberos, which uses symmetric key encryption to validate an individual user’s access to various network resources It keeps a database containing the private keys of clients and servers that are in the authentication domain that it supervises Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Kerberos Kerberos system knows these private keys and can authenticate one network node (client or server) to another Kerberos also generates temporary session keys—that is, private keys given to the two parties in a conversation Kerberos consists of three interacting services, all of which rely on a database library: Authentication Server (AS) Key Distribution Center (KDC) Kerberos Ticket Granting Service (TGS) Management of Information Security, 5th Edition, © Cengage Learning

Managing Cryptographic Controls Don’t lose your keys Know who you are communicating with It may be illegal to use a specific encryption technique when communicating to some nations Every cryptosystem has weaknesses Give access only to those with a business need When placing trust into a certificate authority, ask “Who watches the watchers?” Management of Information Security, 5th Edition, © Cengage Learning

Managing Cryptographic Controls There is no security in obscurity Security protocols and the cryptosystems they use are installed and configured by humans, and thus they are only as good as their installers As with all other information security program components, make sure that your organization’s use of cryptography is based on well-constructed policy and supported with sound management procedures Management of Information Security, 5th Edition, © Cengage Learning