Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Roadmap • Cryptographic algorithms – symmetric ciphers – asymmetric encryption – hash functions • Mutual Trust • Network Security • Computer Security Chapter 1 Objectives To define three security goals To define security attacks that threaten security goals To define security services and how they are related to the three security goals To define security mechanisms to provide security services To introduce two techniques, cryptography and steganography, to implement security mechanisms. 1.3 Key Security Concepts Examples of Security Requirements • confidentiality – student grades • integrity – patient information • availability – The loss of the service translates into a large financial loss Aspects of Security • consider 3 aspects of information security: – security attack – security mechanism – security service • note terms – threat – a potential for violation of security – attack – an assault on system security, a deliberate attempt to evade security services 1-1 SECURITY GOALS This section defines three security goals. Topics discussed in this section: 1.1.1 Confidentiality 1.1.2 Integrity 1.1.3 Security 1.7 1.1 Continued Figure 1.1 Taxonomy of security goals 1.8 1.1.1 Confidentiality Confidentiality is probably the most common aspect of information security. We need to protect our confidential information. An organization needs to guard against those malicious actions that endanger the confidentiality of its information. 1.9 1.1.2 Integrity Information needs to be changed constantly. Integrity means that changes need to be done only by authorized entities and through authorized mechanisms. 1.10 1.1.3 Availability The information created and stored by an organization needs to be available to authorized entities. Information needs to be constantly changed, which means it must be accessible to authorized entities. 1.11 1-2 ATTACKS The three goals of securityconfidentiality, integrity, and availabilitycan be threatened by security attacks. Topics discussed in this section: 1.2.1 Attacks Threatening Confidentiality 1.2.2 Attacks Threatening Integrity 1.2.3 Attacks Threatening Availability 1.2.4 Passive versus Active Attacks 1.12 1.2 Continued Figure 1.2 Taxonomy of attacks with relation to security goals 1.13 1.2.1 Attacks Threatening Confidentiality Snooping refers to unauthorized access to or interception of data. Traffic analysis refers to obtaining some other type of information by monitoring online traffic. 1.14 1.2.2 Attacks Threatening Integrity Modification means that the attacker intercepts the message and changes it. Masquerading or spoofing happens when the attacker impersonates somebody else. Replaying means the attacker obtains a of a message sent by a user and later tries to replay it. copy Repudiation means that sender of the message might later deny that she has sent the message; the receiver of the message might later deny that he has received the message. 1.15 1.2.3 Attacks Threatening Availability Denial of service (DoS) is a very common attack. It may slow down or totally interrupt the service of a system. 1.16 1.2.4 Passive Versus Active Attacks Table 1.1 Categorization of passive and active attacks 1.17 1-3 SERVICES AND MECHANISMS ITU-T provides some security services and some mechanisms to implement those services. Security services and mechanisms are closely related because a mechanism or combination of mechanisms are used to provide a service.. Topics discussed in this section: 1.3.1 Security Services 1.3.2 Security Mechanism 1.3.3 Relation between Services and Mechanisms 1.18 1.3.1 Security Services Figure 1.3 Security services 1.19 1.3.2 Security Mechanism Figure 1.4 Security mechanisms 1.20 1.3.3 Relation between Services and Mechanisms Table 1.2 Relation between security services and mechanisms 1.21 Security Attacks Passive attacks 1. Release of message contents : attack on confidentiality. 2. Traffic analysis: useful in guessing the nature of the communication between two parties. Active attacks 1. Mascurade: 2. Replay: 3. Modification of messages: attack on integrity. 4. Denial of service: attack on availability. Passive Attacks Release of message contents Active Attacks Replay attack Security Service – enhance security of data processing systems and information transfers of an organization – intended to counter security attacks – using one or more security mechanisms – often replicates functions normally associated with physical documents • which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed Definition: Security Services • In the X.800 Standard: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” • In the Internet document RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources” Security Services (X.800) • Authentication - assurance that communicating entity is the one claimed – peer-entity authentication – data origin authentication • Access Control - prevention of the unauthorized use of a resource • Data Confidentiality –protection of data from unauthorized disclosure • Data Integrity - assurance that data received is as sent by an authorized entity • Non-Repudiation - protection against denial by one of the parties in a communication • Availability – resource accessible/usable Security Mechanism • feature designed to detect, prevent, or recover from a security attack • no single mechanism that will support all services required • however one particular element underlies many of the security mechanisms in use: – cryptographic techniques We will focus on this topic Security Mechanisms (X.800) specific security mechanisms Encipherment (encryption), Digital signatures, Access controls, Data integrity, Authentication exchange, Traffic padding, Routing control, Notarization. )(التوثيق 1-4 TECHNIQUES Mechanisms discussed in the previous sections are only theoretical recipes to implement security. The actual implementation of security goals needs some techniques. Two techniques are prevalent today: cryptography and steganography. Topics discussed in this section: 1.4.1 Cryptography 1.4.2 Steganography 1.30 1.4.1 Cryptography Cryptography, a word with Greek origins, means “secret writing.” However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. 1.31 1.4.2 Steganography The word steganography, with origin in Greek, means “covered writing,” in contrast with cryptography, which means “secret writing.” Example: covering data with text 1.32 1.4.2 Continued Example: using dictionary Example: covering data under color image 1.33 Model for Network Security Model for Network Security Using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service Model for Network Access Security Gatekeeper: typically a firewall, Internet security controls: includes IDS (Intrusion Detection System); or IPS (Intrusion Prevention System) Model for Network Access Security Using this model requires us to: 1. Select appropriate gatekeeper functions to identify users. 2. Implement security controls to ensure only authorised users access designated information or resources, for example: user name and password, biometric authentication such as sound identification. Summary • topic roadmap & standards organizations • security concepts: – confidentiality, integrity, availability • X.800 security architecture • security attacks, services, mechanisms • models for network (access) security