Information protection Lecture 2. Cryptographic systems We have a source of information and one for keys. The last one sent using a very safe communication.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Principles of Information Security, 2nd edition1 Cryptography.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
By:Tanvi lotliker TE COMPUTER
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
What is it, how does it work, and why is it important?
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Higher Computing Topic 8: Supporting Software Updated
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Information Security… or something like that! Lecture 1 Zaharia Mihai Horia.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Lecture 2: Introduction to Cryptography
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Advanced Anti-Virus Techniques
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Information Systems Design and Development Security Precautions Computing Science.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
NET 311 Information Security
Cryptography Basics and Symmetric Cryptography
Security in Distributed Systems
Presentation transcript:

Information protection Lecture 2

Cryptographic systems We have a source of information and one for keys. The last one sent using a very safe communication channel the keys for source and destinations The ciphering is a reversible transformation f (bijection) usually unique for a key K over the message. Function f can be composed to increase the security od criptosystem. Figure 1. Cryptographic system

Requirements for good cryptosystems (Sir Francis R. Bacon ( )) 1. Given e k and a plaintext w, it should be easy to compute c = e k (w). 2. Given d k and a cryptotext c, it should be easy to compute w = d k (c). 4. It should be unfeasible to determine w from e k (w) without knowing d k. 5. The so called avalanche effect should hold: A small change in the plaintext, or in the key, should lead to a big change in the cryptotext (i.e. a change of one bit of the plaintext should result in a change of all bits of the cryptotext, each with the probability close to 0.5). 6. The cryptosystem should not be closed under composition, i.e. not for every two keys k 1, k 2 there is a key k such that e k (w) = e k1 (e k2 (w)). 7. The set of keys should be very large. 3. A cryptotext e k (w) should not be much longer than the plaintext w.

Malicious Software

Digital Immune System

Previous figure illustrates the typical steps in digital immune system operation: 1. A monitoring program on each PC uses a variety of heuristics based on system behavior, suspicious changes to programs, or family signature to infer that a virus may be present, & forwards infected programs to an administrative machine 2.The administrative machine encrypts the sample and sends it to a central virus analysis machine 3.This machine creates an environment in which the infected program can be safely run for analysis to produces a prescription for identifying and removing the virus 4.The resulting prescription is sent back to the administrative machine 5.The administrative machine forwards the prescription to the infected client 6.The prescription is also forwarded to other clients in the organization 7.Subscribers around the world receive regular antivirus updates that protect them from the new virus.

Behavior-Blocking Software integrated with host O/S monitors program behavior in real-time –eg file access, disk format, executable mods, system settings changes, network access for possibly malicious actions –if detected can block, terminate, or seek ok has advantage over scanners but malicious code runs before detection

References 1.William Stallings, “Cryptography and Network Security”, 4/e. 2.Davies D.W., Price W.L., “Security for Computer Networks”, John W&Sons, USA, Angheloiu I, ş.a., “Securitatea şi protecţia informaţiei în sistemele electronice de calcul”, Ed. Militară, 1986, Bucureşti 4.Menzenes A., et all, “Handbook of applied cryptography”, CRC Press,

Bad vs Good Guys