Uploaded by Husam Lahza

425 CH 1 Introduction 2015-2016

advertisement
Cryptography and Network
Security
Overview & Chapter 1
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
Roadmap
• Cryptographic algorithms
– symmetric ciphers
– asymmetric encryption
– hash functions
• Mutual Trust
• Network Security
• Computer Security
Chapter 1
Objectives
 To define three security goals
 To define security attacks that threaten security
goals
 To define security services and how they are
related to the three security goals
 To define security mechanisms to provide security
services
 To introduce two techniques, cryptography and
steganography, to implement security
mechanisms.
1.3
Key Security Concepts
Examples of Security Requirements
• confidentiality – student grades
• integrity – patient information
• availability – The loss of the service translates
into a large financial loss
Aspects of Security
• consider 3 aspects of information security:
– security attack
– security mechanism
– security service
• note terms
– threat – a potential for violation of security
– attack – an assault on system security, a
deliberate attempt to evade security services
1-1 SECURITY GOALS
This section defines three security goals.
Topics discussed in this section:
1.1.1 Confidentiality
1.1.2 Integrity
1.1.3 Security
1.7
1.1
Continued
Figure 1.1 Taxonomy of security goals
1.8
1.1.1 Confidentiality
Confidentiality is probably the most common aspect of
information security. We need to protect our confidential
information. An organization needs to guard against those
malicious actions that endanger the confidentiality of its
information.
1.9
1.1.2 Integrity
Information needs to be changed constantly. Integrity means
that changes need to be done only by authorized entities and
through authorized mechanisms.
1.10
1.1.3 Availability
The information created and stored by an organization needs
to be available to authorized entities. Information needs to
be constantly changed, which means it must be accessible to
authorized entities.
1.11
1-2 ATTACKS
The three goals of securityconfidentiality, integrity,
and availabilitycan be threatened by security attacks.
Topics discussed in this section:
1.2.1 Attacks Threatening Confidentiality
1.2.2 Attacks Threatening Integrity
1.2.3 Attacks Threatening Availability
1.2.4 Passive versus Active Attacks
1.12
1.2 Continued
Figure 1.2 Taxonomy of attacks with relation to security goals
1.13
1.2.1 Attacks Threatening Confidentiality
Snooping refers to unauthorized access to or interception of
data.
Traffic analysis refers to obtaining some other type of
information by monitoring online traffic.
1.14
1.2.2 Attacks Threatening Integrity
Modification means that the attacker intercepts the message
and changes it.
Masquerading or spoofing happens when the attacker
impersonates somebody else.
Replaying means the attacker obtains a
of a message sent by a user and later tries to replay it.
copy
Repudiation means that sender of the message might later
deny that she has sent the message; the receiver of the
message might later deny that he has received the message.
1.15
1.2.3 Attacks Threatening Availability
Denial of service (DoS) is a very common attack. It may
slow down or totally interrupt the service of a system.
1.16
1.2.4 Passive Versus Active Attacks
Table 1.1 Categorization of passive and active attacks
1.17
1-3 SERVICES AND MECHANISMS
ITU-T provides some security services and some
mechanisms to implement those services. Security
services and mechanisms are closely related because a
mechanism or combination of mechanisms are used to
provide a service..
Topics discussed in this section:
1.3.1 Security Services
1.3.2 Security Mechanism
1.3.3 Relation between Services and Mechanisms
1.18
1.3.1 Security Services
Figure 1.3 Security services
1.19
1.3.2 Security Mechanism
Figure 1.4 Security mechanisms
1.20
1.3.3 Relation between Services and Mechanisms
Table 1.2 Relation between security services and mechanisms
1.21
Security Attacks
Passive attacks
1. Release of message
contents : attack on
confidentiality.
2. Traffic analysis: useful
in guessing the nature
of the communication
between two parties.
Active attacks
1. Mascurade:
2. Replay:
3. Modification of
messages: attack on
integrity.
4. Denial of service:
attack on availability.
Passive Attacks
Release of message contents
Active Attacks
Replay attack
Security Service
– enhance security of data processing systems and
information transfers of an organization
– intended to counter security attacks
– using one or more security mechanisms
– often replicates functions normally associated
with physical documents
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or destruction;
be notarized or witnessed; be recorded or licensed
Definition: Security Services
• In the X.800 Standard:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”
• In the Internet document RFC 2828:
“a processing or communication service provided by
a system to give a specific kind of protection to
system resources”
Security Services (X.800)
• Authentication - assurance that communicating
entity is the one claimed
– peer-entity authentication
– data origin authentication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received is as
sent by an authorized entity
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Availability – resource accessible/usable
Security Mechanism
• feature designed to detect, prevent, or
recover from a security attack
• no single mechanism that will support all
services required
• however one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
We will focus on this topic
Security Mechanisms (X.800)
specific security mechanisms








Encipherment (encryption),
Digital signatures,
Access controls,
Data integrity,
Authentication exchange,
Traffic padding,
Routing control,
Notarization. )‫(التوثيق‬
1-4 TECHNIQUES
Mechanisms discussed in the previous sections are only
theoretical recipes to implement security. The actual
implementation of security goals needs some
techniques. Two techniques are prevalent today:
cryptography and steganography.
Topics discussed in this section:
1.4.1 Cryptography
1.4.2 Steganography
1.30
1.4.1 Cryptography
Cryptography, a word with Greek origins, means “secret
writing.” However, we use the term to refer to the science
and art of transforming messages to make them secure and
immune to attacks.
1.31
1.4.2 Steganography
The word steganography, with origin in Greek, means
“covered writing,” in contrast with cryptography, which
means “secret writing.”
Example: covering data with text
1.32
1.4.2 Continued
Example: using dictionary
Example: covering data under color image
1.33
Model for Network Security
Model for Network Security
Using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by
the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access Security
Gatekeeper: typically a firewall,
Internet security controls: includes IDS (Intrusion Detection System); or
IPS (Intrusion Prevention System)
Model for Network Access Security
Using this model requires us to:
1. Select appropriate gatekeeper functions to
identify users.
2. Implement security controls to ensure only
authorised users access designated information
or resources, for example:
 user name and password,
 biometric authentication such as sound
identification.
Summary
• topic roadmap & standards organizations
• security concepts:
– confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security
Download