Security Attacks, Mechanisms, and Services

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Sixth Edition by William Stallings.
Advertisements

Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Introduction to network security
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Sorina Persa Group 3250 Group 3250.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Introduction (Based on Lecture slides by J. H. Wang)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Introduction to Computer and Network Security
Cryptography, Authentication and Digital Signatures
Chapter 20 Symmetric Encryption and Message Confidentiality.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Network Security David Lazăr.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Network Security Overview
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Cryptography and Network Security
Introduction to Information Security Introduction & Overview
Message Authentication Code
Cryptography and Network Security
Information System and Network Security
Network Security.
Cryptographic Hash Function
Introduction to Information Security
CNET334 - Network Security
Encryption
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Computer and Network Security
Introduction to Computer and Network Security
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
csci5233 computer security & integrity (Chap. 4)
Cryptography and Network Security
NETW4005 COMPUTER SECURITY - A
Cryptography : Introduction
Basic of Modern Cryptography
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Cryptography and Network Security
Security Attacks Network Security.
Message Authentication
Presentation transcript:

Security Attacks, Mechanisms, and Services

Attacks, Services and Mechanisms Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Passive Attacks These are in the nature of eavesdropping on, or monitoring of, transmission Attempts to learn or make use of information from system Does not affect system resources Difficult to detect because they do not involve any alteration of data Traffic normally sent and received in a normal fashion Attempt is made to prevent the success of these attacks, usually by means of encryption Thus emphasis is on prevention rather than detection

Passive Attacks(cont….) Release of message contents is easily understood Telephonic conversation, e-mail message, or a transferred file may contain sensitive information Emphasis is to prevent opponent from learning

Passive Attacks(cont….) Traffic Analysis Observe patterns of messages Could determine identity and location of communicating hosts Could observe the frequency and length of messages being exchanged

Active Attacks Involves modification of data, or false creation of data Attempt to alter system resources or affect their operations Difficult to prevent active attacks Emphasis is to detect active attacks and recover from the damage

Active Attacks(cont….) Masquarade One entity pretendes to be a different entity E.g. Authentication sequences can be captured Replay Involves passive capture of data unit and its subsequent retransmission to produce unauthorized effect

Active Attacks(cont….) Modification of Message Means some portion of a legitimate message is altered, or messages are reordered or delayed, to produce unauthorized affect E.g. ” Allow John Smith to read confidential file accounts” is modified to ” Allow Fred Brown to read confidential file accounts”

Active Attacks(cont….) Denial of Service Prevents normal use of communication facilities Disabling or overloading of entire network

Conventional Encryption Principles An encryption scheme has five ingredients: Plaintext Encryption algorithm Secret Key Ciphertext Decryption algorithm Security depends on the secrecy of the key, not the secrecy of the algorithm

Conventional Encryption Principles

Cryptography Classified along three independent dimensions: The type of operations used for transforming plaintext to ciphertext The number of keys used symmetric (single key) asymmetric (two-keys, or public-key encryption) The way in which the plaintext is processed

Cryptography can be characterized by: type of encryption operations used substitution / transposition / product number of keys used single-key or private / two-key or public way in which plaintext is processed block / stream

Average time required for exhaustive key search Key Size (bits) Number of Alternative Keys Time required at 106 Decryption/µs 32 232 = 4.3 x 109 2.15 milliseconds 56 256 = 7.2 x 1016 10 hours 128 2128 = 3.4 x 1038 5.4 x 1018 years 168 2168 = 3.7 x 1050 5.9 x 1030 years