Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Computer and Network Security
Information Security Lectures
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Introduction The combination of space, time, and strength that must be considered as the basic elements of this theory of defense makes this a fairly complicated.
Data & Network Security
Network Security Overview
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Computer and Network Security
Introduction to Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Challenges Of Network Security
Security Attacks Network Security.
Definition Of Computer Security
Presentation transcript:

Introduction to Cryptography Based on: William Stallings, Cryptography and Network Security..

Chapter 1 Overview

Cryptology

Cryptographic algorithms and protocols Conceal the contents of blocks or streams of data, using the same private key Symmetric encryption Conceal the contents of blocks of data, using a public key Asymmetric encryption Protect blocks of data, such as messages, from alteration Data integrity algorithms Authenticate the identity of entities Authentication protocols

Computer Security Objectives Data confidentiality Confidential information is not available or disclosed to unauthorized individuals Privacy Individuals control or influence what information may be collected and stored and by whom and to whom that information may be disclosed Confidentiality Data integrity Information and programs are changed only in a specified and authorized manner System integrity A system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system Integrity Systems work promptly and service is not denied to authorized users Availability

CIA Triad

Additional objectives: Authenticity Users are who they say they are and that each input arriving at the system came from a trusted source Accountability Actions of an entity can be traced uniquely to that entity

Breach of Security Levels of Impact* The loss could be expected to have a severe or catastrophic adverse effect High The loss could be expected to have a serious adverse effect Moderate The loss could be expected to have a limited adverse effect Low * FIPS (Federal Information Processing Standard) PUB199

Security Challenges Security is not simple Potential attacks on the security features need to be considered Procedures used to provide particular services are often counter-intuitive It is necessary to decide where to use the various security mechanisms Requires constant monitoring Is too often an afterthought Security mechanisms typically involve more than a particular algorithm or protocol Security is essentially a battle of wits between a perpetrator and the designer Little benefit from security investment is perceived until a security failure occurs Strong security is often viewed as an impediment to efficient and user-friendly operation

OSI* Security Architecture Security attack Any action that compromises the security of information or services Security mechanism A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack Security service A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization * Open System Interoperability (International Telecommunication Union--ITU)

Threats and Attacks (RFC 4949) A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security. Attack An assault on system security that derives from a threat.

Security Attacks A passive attack attempts to learn or make use of information from the system but does not affect system resources An active attack attempts to alter system resources or affect their operation

Passive Attacks Two types of passive attacks: Eavesdropping on, or monitoring of, transmissions Two types of passive attacks: The release of message contents Traffic analysis

Modification of messages Active Attacks One entity pretends to be a different entity Masquerade The passive capture of data and its subsequent retransmission Replay A message is altered, or messages are delayed or reordered Modification of messages Prevent or inhibit the normal use or management of communications facilities Denial of service Modification of data, disruption or creation of a false data

Security Services Architecture and Glossary International Telecommunication Union (ITU) X.800, Security architecture for open systems interconnection Request for Comments RFC 4949 , Internet Security Glossary

X.800 Service Categories Authentication Access control Data confidentiality Data integrity Nonrepudiation

Authentication Peer entity authentication: Assures the recipient that the message is from the source that it claims to be Data origin authentication: Assures the sender and receiver are authentic and that the connection is not interfered with

Access Control Access to host systems and applications via communications links is controlled

Data Confidentiality Transmitted data is protected from passive attacks Traffic flow is protected from analysis

Data Integrity Applies to single messages, a stream of messages, or selected fields within a message Messages are received as sent with no duplication, insertion, modification, reordering, or replays

Nonrepudiation The sender or receiver cannot deny a transmitted message The receiver can prove that the sender in fact sent the message The sender can prove that the receiver in fact received the message

Model for Security, I

Model for Security, II same key

Access Control

Unwanted Access Placement of malware in a computer system that exploits its vulnerabilities. Two kinds of threats: Information access threats Intercept or modify data Service threats Exploit service flaws in computers

Summary Computer security concepts Security attacks Security models Passive attacks Active attacks Security models Security services Confidentiality Integrity Availability Authentication Nonrepudiation Access control

Stephen Hawking Theoretical physicist, cosmologist (motor neurone desease – adaptive word processor --Hawking initially raised his eyebrows to choose letters on a spelling card)