SlideShare a Scribd company logo
1 of 25
Data Security & Cryptography
(Lecture 1)
Agenda
Course Contents
Prerequisite & Text Book
What is Security?
Network Security
Aspects of Security
Threat and Attack
Active vs. Passive Attack
Security Services
Encryption?
Course Objective
Grading and Policies
Course objectives
The aim of the course is to help the students
understand important concepts in cryptography,
including classical cryptographic schemes, block
ciphers, hash functions, public-key encryption, digital
signatures, authentication schemes, Network
Security Applications and System Security.
Course Content
Introduction to Security
Symmetric ciphers
Public key Encryption & Hash functions
Network Security Applications
System Security
Prerequisite & Textbook
“Cryptography and Network Security Principles
and Practices”, Fourth Edition, by William stalling
Reference books
Cryptography and Network Security” by
Behrouz A Forouzan
“Introduction to Network Security” by Neal
Krawets.
“Introduction to Cryptography and Network
Security” by Sunil Gupta
Security ?
Confidentiality :
Assurance that information is shared only among authorised people or
organisations
Integrity :
Assurance that the information is authentic and complete; ensuring that
information can be relied upon to be sufficiently accurate for its
purpose
Availability :
Assurance that the systems responsible for delivering, storing and
processing information are accessible when needed, by those who need
them
Network Security?
Network security is the security measures that
are needed to protect data during their
transmission.
Aspects of Security
Security attack: Any action that compromises the
security of information owned by an organization.
Security mechanism: A mechanism that is designed to
detect, prevent, or recover from a security attack.
Security service: A service that enhances the security
of the data processing systems and the information
transfers of an organization.
Designed to counter security attacks.
Threat & Attack
Threat
A person, thing, event, or idea which poses some danger to an asset in
terms of that asset's confidentiality, integrity, availability, or legitimate
use.
Threats: Passive [Monitoring but no alterations to the information] and
Active [Deliberate alteration of information]
Attack
A realization of a threat; Any action that attempts to compromise the
security of the information owned by an organization/person
Categories of Attacks
Interruption
Interception
Modification
Fabrication
Interruption
Destroy hardware (cutting fiber) or software
Corrupt packets in transit
Denial of service (DoS):
Crashing the server
Overwhelm the server (use up its resource)
S R
Interception
Unauthorized access to information
Packet sniffers and wire-tappers
Illicit copying of files and programs
S R
Eavesdropper
Modification
Stop the flow of the message.
Delay and optionally modify the message
Release the message again.
S R
Perpetrator
Fabrication
Unauthorized assumption of other’s
identity
Generate and distribute objects under
this identity
S R
Masquerader: from S
Passive Attacks
Passive attacks eavesdrop, or monitor,
transmission.
Goal: To obtain transmitted information.
2 Types of passive attacks.
Passive Attack Types
Release of contents: A telephone conversation, an
electronic mail message, or confidential information.
Traffic analysis: Using the location and identities of
hosts and the frequency and length of messages to
determine the type of communication taking place.
Passive attacks are difficult to detect since they do not
involve any alteration of data.
Active Attacks
An active attack involve the modification of
the data stream or the creation of a false
stream.
4 Types of active attacks
Active Attacks Types
Masquerade takes place when one entity pretends to be a
different entity.
This form usually includes one of the other forms of active attack.
Replay involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
Modification occurs when an unauthorized party gains access
to and tampers with an asset.
This is an attack on integrity.
Denial of service prevents or slow down the normal use or
management of communications facilities.
Security Services (CAIN2A)
Confidentiality is the protection of transmitted data from passive attacks.
Authentication is concerned with assuring that a communication is
authentic.
Integrity assures that messages are received as sent.
A connection-oriented integrity service should assure that there are no
duplicates, insertions, deletions, modifications, reordering, or replays.
A connectionless integrity service deals only with an individual
message.
Non-repudiation prevents either the sender or receiver from denying a
transmitted message.
Access Control is the ability to limit and control the access to host systems
and applications via communications links.
Availability is the ability to prevent the loss or a reduction in availability of
elements of a distributed system.
Encryption
Information has to be concealed from an unauthorised person
(attacker), so that in the event that it is passively accessed (e.g., copied
or intercepted) by an attacker, it should not be useful to them
There are actually two subjects that deal with the concealment of
information from unauthorised people:
Cryptography is the study of hiding critical information by encoding it
to a unintelligible form using a secret key
The encoding is commonly called encryption
If the information is compromised, the attacker should not be able
to decode (decrypt) it back to the original information without
knowledge of the secret key
Steganography is the study of hiding critical information within some
other less important information:
If the less important information is compromised, the attacker
should not be able to even identify, let alone extract, the critical
information
Grading Scheme & Policy
Matters
Assignments [15%]
Assignments will be issued which will be due one week from the issue date
Quizzes [15%]
Surprises ..
Term Project [10%]
given on group basis , must be submitted two weeks before final exams
Mid-Term Exam [20%]
Final Exam [40%]
contains all the stuff covered
End of Lecture
Next Lecture
“Introduction to key concepts in cryptography”

More Related Content

What's hot

Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Sina Manavi
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network securitysneha padhiar
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksDefCamp
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecurityCSCJournals
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Apt zero day malware
Apt zero day malwareApt zero day malware
Apt zero day malwareaspiretss
 

What's hot (19)

Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
18
1818
18
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Net Sec
Net SecNet Sec
Net Sec
 
Apt zero day malware
Apt zero day malwareApt zero day malware
Apt zero day malware
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

Similar to Data Security & Cryptography Course (40ch

Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with securityeSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocolseSAT Journals
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyUmangThakkar26
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdfsurajthakur474818
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxsangeeta borde
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementBhadra Gowdra
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptxBisharSuleiman
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyKiran Patil
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographypinkutinku26
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introductionShu Shin
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfVishwanathMahalle
 

Similar to Data Security & Cryptography Course (40ch (20)

Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdf
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Unit 1
Unit 1Unit 1
Unit 1
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Data Security & Cryptography Course (40ch

  • 1. Data Security & Cryptography (Lecture 1)
  • 2. Agenda Course Contents Prerequisite & Text Book What is Security? Network Security Aspects of Security Threat and Attack Active vs. Passive Attack Security Services Encryption? Course Objective Grading and Policies
  • 3. Course objectives The aim of the course is to help the students understand important concepts in cryptography, including classical cryptographic schemes, block ciphers, hash functions, public-key encryption, digital signatures, authentication schemes, Network Security Applications and System Security.
  • 4. Course Content Introduction to Security Symmetric ciphers Public key Encryption & Hash functions Network Security Applications System Security
  • 5. Prerequisite & Textbook “Cryptography and Network Security Principles and Practices”, Fourth Edition, by William stalling
  • 6. Reference books Cryptography and Network Security” by Behrouz A Forouzan “Introduction to Network Security” by Neal Krawets. “Introduction to Cryptography and Network Security” by Sunil Gupta
  • 7. Security ? Confidentiality : Assurance that information is shared only among authorised people or organisations Integrity : Assurance that the information is authentic and complete; ensuring that information can be relied upon to be sufficiently accurate for its purpose Availability : Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them
  • 8. Network Security? Network security is the security measures that are needed to protect data during their transmission.
  • 9. Aspects of Security Security attack: Any action that compromises the security of information owned by an organization. Security mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security service: A service that enhances the security of the data processing systems and the information transfers of an organization. Designed to counter security attacks.
  • 10. Threat & Attack Threat A person, thing, event, or idea which poses some danger to an asset in terms of that asset's confidentiality, integrity, availability, or legitimate use. Threats: Passive [Monitoring but no alterations to the information] and Active [Deliberate alteration of information] Attack A realization of a threat; Any action that attempts to compromise the security of the information owned by an organization/person Categories of Attacks Interruption Interception Modification Fabrication
  • 11.
  • 12. Interruption Destroy hardware (cutting fiber) or software Corrupt packets in transit Denial of service (DoS): Crashing the server Overwhelm the server (use up its resource) S R
  • 13. Interception Unauthorized access to information Packet sniffers and wire-tappers Illicit copying of files and programs S R Eavesdropper
  • 14. Modification Stop the flow of the message. Delay and optionally modify the message Release the message again. S R Perpetrator
  • 15. Fabrication Unauthorized assumption of other’s identity Generate and distribute objects under this identity S R Masquerader: from S
  • 16.
  • 17. Passive Attacks Passive attacks eavesdrop, or monitor, transmission. Goal: To obtain transmitted information. 2 Types of passive attacks.
  • 18. Passive Attack Types Release of contents: A telephone conversation, an electronic mail message, or confidential information. Traffic analysis: Using the location and identities of hosts and the frequency and length of messages to determine the type of communication taking place. Passive attacks are difficult to detect since they do not involve any alteration of data.
  • 19. Active Attacks An active attack involve the modification of the data stream or the creation of a false stream. 4 Types of active attacks
  • 20. Active Attacks Types Masquerade takes place when one entity pretends to be a different entity. This form usually includes one of the other forms of active attack. Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect. Modification occurs when an unauthorized party gains access to and tampers with an asset. This is an attack on integrity. Denial of service prevents or slow down the normal use or management of communications facilities.
  • 21. Security Services (CAIN2A) Confidentiality is the protection of transmitted data from passive attacks. Authentication is concerned with assuring that a communication is authentic. Integrity assures that messages are received as sent. A connection-oriented integrity service should assure that there are no duplicates, insertions, deletions, modifications, reordering, or replays. A connectionless integrity service deals only with an individual message. Non-repudiation prevents either the sender or receiver from denying a transmitted message. Access Control is the ability to limit and control the access to host systems and applications via communications links. Availability is the ability to prevent the loss or a reduction in availability of elements of a distributed system.
  • 22. Encryption Information has to be concealed from an unauthorised person (attacker), so that in the event that it is passively accessed (e.g., copied or intercepted) by an attacker, it should not be useful to them There are actually two subjects that deal with the concealment of information from unauthorised people: Cryptography is the study of hiding critical information by encoding it to a unintelligible form using a secret key The encoding is commonly called encryption If the information is compromised, the attacker should not be able to decode (decrypt) it back to the original information without knowledge of the secret key Steganography is the study of hiding critical information within some other less important information: If the less important information is compromised, the attacker should not be able to even identify, let alone extract, the critical information
  • 23. Grading Scheme & Policy Matters Assignments [15%] Assignments will be issued which will be due one week from the issue date Quizzes [15%] Surprises .. Term Project [10%] given on group basis , must be submitted two weeks before final exams Mid-Term Exam [20%] Final Exam [40%] contains all the stuff covered
  • 25. Next Lecture “Introduction to key concepts in cryptography”