Information Security Principles (ESGD4222) Eng. Mohanned M. Dawoud Cryptography and Network Security
Textbook Cryptography and Network Security: Principles and Practice; By William Stallings, Fourth Edition Cryptography and Network Security
Grading and Others Grading Homework 20% Mid Term 25% Report & Presentation 15% Final exam 40% Cryptography and Network Security
Topics Introduction Number Theory Traditional Methods: secret key system Modern Methods: Public Key System Digital Signature and others Internet Security: DoS, DDoS Other topics: secret sharing, zero-knowledge proof, bit commitment, oblivious transfer,… Cryptography and Network Security
Organization Chapters Introduction Number Theory Conventional Encryption Block Ciphers Public Key System Key Management Hash Function and Digital Signature Identification Secret Sharing Pseudo-random number Generation Email Security Internet Security Others Cryptography and Network Security
Cryptography and Network Security Introduction Xiang-Yang Li Cryptography and Network Security
Introduction The art of war teaches us not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. --The art of War, Sun Tzu Cryptography and Network Security
Cryptography Cryptography (from Greek kryptós, "hidden", and gráphein, "to write") is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge — the art of encryption. Past: Cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. Cryptography and Network Security
Crypto-graphy, -analysis, -logy The study of how to circumvent the use of cryptography is called cryptanalysis, or codebreaking. Cryptography and cryptanalysis are sometimes grouped together under the umbrella term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole; crypto is an informal abbreviation. Cryptography and Network Security
Approaches to Secure Communication Steganography “covered writing” hides the existence of a message Cryptography “hidden writing” hide the meaning of a message Cryptography and Network Security
Stenography Example Last 2 bits Cryptography and Network Security
Network Security Model Trusted Third Party principal principal Security transformation Security transformation attacker Cryptography and Network Security
Attacks, Services and Mechanisms Security Attacks Action compromises the information security Could be passive or active attacks Security Services Actions that can prevent, detect such attacks. Such as authentication, identification, encryption, signature, secret sharing and so on. Security mechanism The ways to provide such services Detect, prevent and recover from a security attack Cryptography and Network Security
Attacks Passive attacks Active attacks Interception Release of message contents Traffic analysis Active attacks Interruption, modification, fabrication Masquerade Replay Modification Denial of service Cryptography and Network Security
Information Transferring Cryptography and Network Security
Attack: Interruption Cut wire lines, Jam wireless signals, Drop packets, Cryptography and Network Security
Attack: Interception Wiring, eavesdrop Cryptography and Network Security
Attack: Modification Replaced info intercept Cryptography and Network Security
Also called impersonation Attack: Fabrication Also called impersonation Cryptography and Network Security
Attacks, Services and Mechanisms Security Attacks Action compromises the information security Could be passive or active attacks Security Services Actions that can prevent, detect such attacks. Such as authentication, identification, encryption, signature, secret sharing and so on. Security mechanism The ways to provide such services Detect, prevent and recover from a security attack Cryptography and Network Security
Important Services of Security Confidentiality, also known as secrecy: only an authorized recipient should be able to extract the contents of the message from its encrypted form. Otherwise, it should not be possible to obtain any significant information about the message contents. Integrity: the recipient should be able to determine if the message has been altered during transmission. Authentication: the recipient should be able to identify the sender, and verify that the purported sender actually did send the message. Non-repudiation: the sender should not be able to deny sending the message. Cryptography and Network Security
Homework Describe two of the functions listed in Table 1.1 of the Textbook in half page for each one, be ready to discuss them in the next lecture. Deadline: Tuesday 3/3/2009