Cryptography : Introduction

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography & Classical Ciphers
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Network security Network security. Look at the surroundings before you leap.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Database Security and Encryption
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Information Security Principles and Practices
By Marwan Al-Namari Author: William Stallings
Data & Network Security
Cryptography and Network Security
Information System and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Data & Network Security
Introduction to Information Security
CNET334 - Network Security
Encryption
Information and Network Security
10CS835 Information Security
NET 311 Information Security
Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Unit 2: Cryptography & Cryptographic Algorithm
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Information and Network Security
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

Cryptography : Introduction By Sheetal (For CSIT)

Cryptography: Introduction Greek word: Hidden Secret Study differs now and past past : encryption and decryption now: past + digital signature + authentication + key mgmt + cryptanalysis The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form

Aspect Security Security attack: Any action that compromises the security of information owned by an organization. • Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

More terms threat – a potential for violation of security attack – an assault on system security, a deliberate attempt to evade security services

Attack : Classification Passive: obtain information but not change contents Active: obtain information but not change contents

Passive Attacks (1) Release of Message Contents A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.

Passive Attacks (2) Traffic Analysis

Passive attack contd… Passive attacks do not affect system resources Eavesdropping, monitoring Two types of passive attacks Release of message contents Traffic analysis Passive attacks are very difficult to detect Message transmission apparently normal No alteration of the data Emphasis on prevention rather than detection By means of encryption

Active Attacks (1) : Masquerade (a false show) )

Active Attacks (2) Replay Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: masquerade of one entity as some other replay previous messages (as shown above in Stallings Figure 1.3b) modify/alter (part of) messages in transit to produce an unauthorized effect denial of service - prevents or inhibits the normal use or management of communications facilities Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.

Active Attacks (3) Modification of Messages

Active Attacks (4) Denial of Service

Active attacks try to alter system resources or affect their operation Modification of data, or creation of false data Four categories Masquerade Replay Modification of messages Denial of service: preventing normal use A specific target or entire network Difficult to prevent The goal is to detect and recover

Attacking software Viruses Worms Trojan Horses

Classical Cryptography Symbol were used in ancient Egypt

Classical Cryptography Greece around 500 BC

Classical Cryptography Caesar cypher in ancient Rome Substitution cypher Alberti Cipher during 1400 Form of substitution cypher using mechanical disk

Classical Cryptography Vigenere Cypher: 1500 AD Use Table and Key Plain: attackatdawn Key: lemonlemonle Cypher: LXFOPVEFRNHR

Classical Cryptography Jefferson Wheel Cipher : Late 1700’s Wheel with random alphabet Arrangement of Wheels is key Developed lately by US Army Used from 1923-1942

Classical Cryptography WWI & WWII  Boom of cryptography method Zimmerman Telegram – German army in 1917 Choctaw Codetalkers – US army Enigma by Nazi (10144 Combination) – But cracked by Alan Turing (The imitation game’s guy) Purple by Japanese