SlideShare a Scribd company logo
1 of 22
*
Cryptographic Security
Cryptographic Security
Security Goals
*
 Confidentiality : private or confidential
information is not made available or disclosed to
unauthorized individuals.
In industry, hiding some information from competitors
is crucial to the operation of the organization
In banking, customers’ accounts need to be kept
secret.
 Integrity : Integrity means changes need to be
done only by authorized entities and through
authorized mechanisms.
In a bank, when a customer deposits or withdraws
money, the balance needs to be changed.
 Availability : The information created and stored
by an organization needs to be available to
authorized entities.
Cryptographic Security
OSI security Architecture
 Security Attack : Any action that compromises
the security of the information.
 Security Mechanism : A mechanism that is
designed to detect, prevent or recover from a
security attack.
 Security Services : A service that enhances the
security of data processing systems and
information transfers. A security service makes
use of one or more security mechanisms.
*
Cryptographic Security
Security Attacks
*
Taxonomy of attacks with relation to security goa
Cryptographic Security
Attacks threatening to confidentiality
 Snooping : It refers to unauthorized access to or
interception of data. To prevent snooping data
can be made non intelligible by using encryption
techniques.
 Traffic analysis : If we had encryption protection
in place, an opponent might still be able to
observe the pattern of these messages. The
opponent could determine the location and
identity of communicating hosts and could
observe the frequency and length of messages
being exchanged. This information might be
useful in guessing the nature of the
communication that was taking place.*
Cryptographic Security
*
Snooping
Traffic
Analysis
Cryptographic Security
Attacks threatening to integrity
 Modification : After intercepting or accessing the
information, the attacker modifies the information
to make it beneficial to himself.
A customer sends a message to a bank to do some
transaction. The attacker intercepts the message
and changes the type of transaction to benefit
himself.
 Masquerading : Masquerading, or spoofing,
happens when the attacker impersonates
somebody else.
For example, an attacker might steal the bank card
and PIN of a bank customer and pretend that he is
a customer.*
Cryptographic Security
*
Modification
Masquerade
Cryptographic Security
Attacks threatening to integrity
 Replaying : The attacker obtains a copy of a
message sent by a user and later tries to replay
it.
A person sends a request to his bank to ask for
payment to the attacker, who has done a job for
her. The attacker intercepts the message and sends
it again to receive another payment from the bank.
 Repudiation : It is performed by one of the two
parties in the communication. The sender of the
message might later deny that he has sent the
message; the receiver of the message might later
deny that he has received the message.
The sender would be a bank customer asking her
bank to send some money to a third party but later*
Cryptographic Security
*
Replaying
Cryptographic Security
Attacks threatening to availability
 Denial of service : The attacker might intercept
and delete a server’s response to a client, making
the client to believe that the server is not
responding. The attacker may also intercept
requests from clients, causing the clients to send
requests many times and overload the system.
*
Cryptographic Security
Passive Vs Active Attacks
 Passive attacks : The attacker’s goal is just to
obtain information. He does not modify data or
harm the system.
 Active Attacks : An active attack may change
the data or harm the system.
*
Attacks Passive/Active Threatening
Snooping Traffic
analysis
Passive Confidentiality
Modification
Masquerading
Replaying Repudiation
Active Integrity
Denial of Service Active Availability
Cryptographic Security
Security Services
 ITU-T(X.800)[International Telecommunication
Union-Telecommunication Standardization
Sector] has defined five services related to the
security goals and attacks.
 Authentication: This service provides the
authentication of the party at the other end of the
line.
Peer entity authentication: In connection oriented
communication, it provides authentication of the
sender or receiver during the connection
establishment.
Data origin authentication: In connectionless
communication, it authenticates the source of the
data.
*
Cryptographic Security
Security Services
 Data confidentiality : Data confidentiality is
designed to protect data from disclosure attack. It
is designed to prevent snooping and traffic
analysis attack.
 Data integrity : It is designed to protect data from
modification, insertion, deletion and replaying by
an adversary.
 Nonrepudiation : Provides protection against
denial by one of the entities involved in a
communication of having participated in all or part
of the communication.
*
Cryptographic Security
Security Mechanisms
 Encipherment : The use of mathematical
algorithms to transform data into a form that is not
readily intelligible.
 Digital Signature : It is a means by which the
sender can electronically sign the data and the
receiver can electronically verify the signature.
 Access control : Access control uses methods to
prove that a user has access right to the data or
resources owned by a system. Examples of
proofs are passwords and PIN.
 Authentication exchange : In authentication
exchange, two entities exchange some message
to prove their identity to each other.
*
Cryptographic Security
Security Mechanisms
 Data integrity : The data integrity mechanism
appends to the data a short check value that has
been created by a specific process from he data
itself. The receiver receives the data and the
check value. He creates a new check value from
the received data and compares the newly
created check value with the one received. If the
two check values are the same, the integrity of
data has been preserved.
 Traffic Padding : Traffic padding means insertion
of bits into gaps in a data stream to frustrate
traffic analysis attempts.*
Cryptographic Security
Security Mechanisms
 Routing Control : Routing control means
selecting and continuously changing different
available routes between the sender and the
receiver.
 Notarization : The use of a trusted third party to
assure certain properties of a data exchange. The
receiver can involve a trusted party to store the
sender request in order to prevent the sender
from later denying that he has made such a
request.
*
Cryptographic SecurityRelation between Security
Services and Security
Mechanism
*
Cryptographic Security
Cryptography – Basic Concepts
 Cryptography is the study of
Secret (crypto-) writing (-graphy)
 Cryptography
The art or science encompassing the principles
and methods of transforming an intelligible
message into one that is unintelligible, and then
retransforming that message back to its original
form.
 Plaintext
" The original intelligible message”
 Ciphertext
" The transformed message”
*
Cryptographic Security
Basic Concepts
 Cipher
An algorithm for transforming an intelligible
message into unintelligible by transposition
and/or substitution.
 Key
Some critical information used by the cipher,
known only to the sender & receiver.
 Encipher (encode)
The process of converting plaintext to ciphertext
 Decipher (decode)
The process of converting ciphertext back into
plaintext
*
Cryptographic Security
Basic Concepts
 Cryptanalysis
The study of principles and methods of
transforming an
unintelligible message back into an intelligible
message without knowledge of the key. Also
called codebreaking.
 Cryptology
Both cryptography and cryptanalysis
*
Cryptographic Security
Cryptography
*
plaintext (data file or messages)
encryption
ciphertext (stored or transmitted safely)
decryption
plaintext (original data or messages)

More Related Content

What's hot

What's hot (20)

DES
DESDES
DES
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Steganography
SteganographySteganography
Steganography
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Email security
Email securityEmail security
Email security
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 

Viewers also liked

CV update 19 Des 2015
CV update 19 Des 2015CV update 19 Des 2015
CV update 19 Des 2015
iwan setiawan
 
Trabajo practico n 5 informatica
Trabajo practico n 5 informaticaTrabajo practico n 5 informatica
Trabajo practico n 5 informatica
FacundoReyes
 
Nate jackman bar serve
Nate jackman bar serveNate jackman bar serve
Nate jackman bar serve
Nathan Jackman
 
RESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENSRESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENS
Rohit Gupta
 
Smart Emission Control System
Smart Emission Control SystemSmart Emission Control System
Smart Emission Control System
payal_dodeja
 
Final PPT Imdb (1)
Final PPT Imdb (1)Final PPT Imdb (1)
Final PPT Imdb (1)
payal_dodeja
 

Viewers also liked (19)

CV update 19 Des 2015
CV update 19 Des 2015CV update 19 Des 2015
CV update 19 Des 2015
 
Trabajo practico n 5 informatica
Trabajo practico n 5 informaticaTrabajo practico n 5 informatica
Trabajo practico n 5 informatica
 
EnergyPlus
EnergyPlusEnergyPlus
EnergyPlus
 
Nate jackman bar serve
Nate jackman bar serveNate jackman bar serve
Nate jackman bar serve
 
Claudeolivier
ClaudeolivierClaudeolivier
Claudeolivier
 
Cntesfebrer
CntesfebrerCntesfebrer
Cntesfebrer
 
Test
TestTest
Test
 
RESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENSRESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENS
 
Profile of the one jsc
Profile of the one jscProfile of the one jsc
Profile of the one jsc
 
One Health Initiative from Unisveristy to Stakeholder Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder   Noor ISMAILOne Health Initiative from Unisveristy to Stakeholder   Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder Noor ISMAIL
 
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
 
Наука как блокбастер
Наука как блокбастерНаука как блокбастер
Наука как блокбастер
 
Hdlc
HdlcHdlc
Hdlc
 
Что происходит с космонавтикой?
Что происходит с космонавтикой?Что происходит с космонавтикой?
Что происходит с космонавтикой?
 
Smart Emission Control System
Smart Emission Control SystemSmart Emission Control System
Smart Emission Control System
 
Final PPT Imdb (1)
Final PPT Imdb (1)Final PPT Imdb (1)
Final PPT Imdb (1)
 
Polaris Product Fact Sheet
Polaris Product Fact SheetPolaris Product Fact Sheet
Polaris Product Fact Sheet
 
Sales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABMSales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABM
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 

Similar to Cryptographic Security

Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
AparnaSunil24
 

Similar to Cryptographic Security (20)

Cryptography Network Security Introduction
Cryptography Network Security IntroductionCryptography Network Security Introduction
Cryptography Network Security Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
The Road Network security
The Road Network securityThe Road Network security
The Road Network security
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 

Recently uploaded

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Cryptographic Security

  • 2. Cryptographic Security Security Goals *  Confidentiality : private or confidential information is not made available or disclosed to unauthorized individuals. In industry, hiding some information from competitors is crucial to the operation of the organization In banking, customers’ accounts need to be kept secret.  Integrity : Integrity means changes need to be done only by authorized entities and through authorized mechanisms. In a bank, when a customer deposits or withdraws money, the balance needs to be changed.  Availability : The information created and stored by an organization needs to be available to authorized entities.
  • 3. Cryptographic Security OSI security Architecture  Security Attack : Any action that compromises the security of the information.  Security Mechanism : A mechanism that is designed to detect, prevent or recover from a security attack.  Security Services : A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. *
  • 4. Cryptographic Security Security Attacks * Taxonomy of attacks with relation to security goa
  • 5. Cryptographic Security Attacks threatening to confidentiality  Snooping : It refers to unauthorized access to or interception of data. To prevent snooping data can be made non intelligible by using encryption techniques.  Traffic analysis : If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place.*
  • 7. Cryptographic Security Attacks threatening to integrity  Modification : After intercepting or accessing the information, the attacker modifies the information to make it beneficial to himself. A customer sends a message to a bank to do some transaction. The attacker intercepts the message and changes the type of transaction to benefit himself.  Masquerading : Masquerading, or spoofing, happens when the attacker impersonates somebody else. For example, an attacker might steal the bank card and PIN of a bank customer and pretend that he is a customer.*
  • 9. Cryptographic Security Attacks threatening to integrity  Replaying : The attacker obtains a copy of a message sent by a user and later tries to replay it. A person sends a request to his bank to ask for payment to the attacker, who has done a job for her. The attacker intercepts the message and sends it again to receive another payment from the bank.  Repudiation : It is performed by one of the two parties in the communication. The sender of the message might later deny that he has sent the message; the receiver of the message might later deny that he has received the message. The sender would be a bank customer asking her bank to send some money to a third party but later*
  • 11. Cryptographic Security Attacks threatening to availability  Denial of service : The attacker might intercept and delete a server’s response to a client, making the client to believe that the server is not responding. The attacker may also intercept requests from clients, causing the clients to send requests many times and overload the system. *
  • 12. Cryptographic Security Passive Vs Active Attacks  Passive attacks : The attacker’s goal is just to obtain information. He does not modify data or harm the system.  Active Attacks : An active attack may change the data or harm the system. * Attacks Passive/Active Threatening Snooping Traffic analysis Passive Confidentiality Modification Masquerading Replaying Repudiation Active Integrity Denial of Service Active Availability
  • 13. Cryptographic Security Security Services  ITU-T(X.800)[International Telecommunication Union-Telecommunication Standardization Sector] has defined five services related to the security goals and attacks.  Authentication: This service provides the authentication of the party at the other end of the line. Peer entity authentication: In connection oriented communication, it provides authentication of the sender or receiver during the connection establishment. Data origin authentication: In connectionless communication, it authenticates the source of the data. *
  • 14. Cryptographic Security Security Services  Data confidentiality : Data confidentiality is designed to protect data from disclosure attack. It is designed to prevent snooping and traffic analysis attack.  Data integrity : It is designed to protect data from modification, insertion, deletion and replaying by an adversary.  Nonrepudiation : Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. *
  • 15. Cryptographic Security Security Mechanisms  Encipherment : The use of mathematical algorithms to transform data into a form that is not readily intelligible.  Digital Signature : It is a means by which the sender can electronically sign the data and the receiver can electronically verify the signature.  Access control : Access control uses methods to prove that a user has access right to the data or resources owned by a system. Examples of proofs are passwords and PIN.  Authentication exchange : In authentication exchange, two entities exchange some message to prove their identity to each other. *
  • 16. Cryptographic Security Security Mechanisms  Data integrity : The data integrity mechanism appends to the data a short check value that has been created by a specific process from he data itself. The receiver receives the data and the check value. He creates a new check value from the received data and compares the newly created check value with the one received. If the two check values are the same, the integrity of data has been preserved.  Traffic Padding : Traffic padding means insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.*
  • 17. Cryptographic Security Security Mechanisms  Routing Control : Routing control means selecting and continuously changing different available routes between the sender and the receiver.  Notarization : The use of a trusted third party to assure certain properties of a data exchange. The receiver can involve a trusted party to store the sender request in order to prevent the sender from later denying that he has made such a request. *
  • 18. Cryptographic SecurityRelation between Security Services and Security Mechanism *
  • 19. Cryptographic Security Cryptography – Basic Concepts  Cryptography is the study of Secret (crypto-) writing (-graphy)  Cryptography The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form.  Plaintext " The original intelligible message”  Ciphertext " The transformed message” *
  • 20. Cryptographic Security Basic Concepts  Cipher An algorithm for transforming an intelligible message into unintelligible by transposition and/or substitution.  Key Some critical information used by the cipher, known only to the sender & receiver.  Encipher (encode) The process of converting plaintext to ciphertext  Decipher (decode) The process of converting ciphertext back into plaintext *
  • 21. Cryptographic Security Basic Concepts  Cryptanalysis The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking.  Cryptology Both cryptography and cryptanalysis *
  • 22. Cryptographic Security Cryptography * plaintext (data file or messages) encryption ciphertext (stored or transmitted safely) decryption plaintext (original data or messages)