SlideShare a Scribd company logo
1 of 22
*
Cryptographic Security
Cryptographic Security
Security Goals
*
 Confidentiality : private or confidential
information is not made available or disclosed to
unauthorized individuals.
In industry, hiding some information from competitors
is crucial to the operation of the organization
In banking, customers’ accounts need to be kept
secret.
 Integrity : Integrity means changes need to be
done only by authorized entities and through
authorized mechanisms.
In a bank, when a customer deposits or withdraws
money, the balance needs to be changed.
 Availability : The information created and stored
by an organization needs to be available to
authorized entities.
Cryptographic Security
OSI security Architecture
 Security Attack : Any action that compromises
the security of the information.
 Security Mechanism : A mechanism that is
designed to detect, prevent or recover from a
security attack.
 Security Services : A service that enhances the
security of data processing systems and
information transfers. A security service makes
use of one or more security mechanisms.
*
Cryptographic Security
Security Attacks
*
Taxonomy of attacks with relation to security goa
Cryptographic Security
Attacks threatening to confidentiality
 Snooping : It refers to unauthorized access to or
interception of data. To prevent snooping data
can be made non intelligible by using encryption
techniques.
 Traffic analysis : If we had encryption protection
in place, an opponent might still be able to
observe the pattern of these messages. The
opponent could determine the location and
identity of communicating hosts and could
observe the frequency and length of messages
being exchanged. This information might be
useful in guessing the nature of the
communication that was taking place.*
Cryptographic Security
*
Snooping
Traffic
Analysis
Cryptographic Security
Attacks threatening to integrity
 Modification : After intercepting or accessing the
information, the attacker modifies the information
to make it beneficial to himself.
A customer sends a message to a bank to do some
transaction. The attacker intercepts the message
and changes the type of transaction to benefit
himself.
 Masquerading : Masquerading, or spoofing,
happens when the attacker impersonates
somebody else.
For example, an attacker might steal the bank card
and PIN of a bank customer and pretend that he is
a customer.*
Cryptographic Security
*
Modification
Masquerade
Cryptographic Security
Attacks threatening to integrity
 Replaying : The attacker obtains a copy of a
message sent by a user and later tries to replay
it.
A person sends a request to his bank to ask for
payment to the attacker, who has done a job for
her. The attacker intercepts the message and sends
it again to receive another payment from the bank.
 Repudiation : It is performed by one of the two
parties in the communication. The sender of the
message might later deny that he has sent the
message; the receiver of the message might later
deny that he has received the message.
The sender would be a bank customer asking her
bank to send some money to a third party but later*
Cryptographic Security
*
Replaying
Cryptographic Security
Attacks threatening to availability
 Denial of service : The attacker might intercept
and delete a server’s response to a client, making
the client to believe that the server is not
responding. The attacker may also intercept
requests from clients, causing the clients to send
requests many times and overload the system.
*
Cryptographic Security
Passive Vs Active Attacks
 Passive attacks : The attacker’s goal is just to
obtain information. He does not modify data or
harm the system.
 Active Attacks : An active attack may change
the data or harm the system.
*
Attacks Passive/Active Threatening
Snooping Traffic
analysis
Passive Confidentiality
Modification
Masquerading
Replaying Repudiation
Active Integrity
Denial of Service Active Availability
Cryptographic Security
Security Services
 ITU-T(X.800)[International Telecommunication
Union-Telecommunication Standardization
Sector] has defined five services related to the
security goals and attacks.
 Authentication: This service provides the
authentication of the party at the other end of the
line.
Peer entity authentication: In connection oriented
communication, it provides authentication of the
sender or receiver during the connection
establishment.
Data origin authentication: In connectionless
communication, it authenticates the source of the
data.
*
Cryptographic Security
Security Services
 Data confidentiality : Data confidentiality is
designed to protect data from disclosure attack. It
is designed to prevent snooping and traffic
analysis attack.
 Data integrity : It is designed to protect data from
modification, insertion, deletion and replaying by
an adversary.
 Nonrepudiation : Provides protection against
denial by one of the entities involved in a
communication of having participated in all or part
of the communication.
*
Cryptographic Security
Security Mechanisms
 Encipherment : The use of mathematical
algorithms to transform data into a form that is not
readily intelligible.
 Digital Signature : It is a means by which the
sender can electronically sign the data and the
receiver can electronically verify the signature.
 Access control : Access control uses methods to
prove that a user has access right to the data or
resources owned by a system. Examples of
proofs are passwords and PIN.
 Authentication exchange : In authentication
exchange, two entities exchange some message
to prove their identity to each other.
*
Cryptographic Security
Security Mechanisms
 Data integrity : The data integrity mechanism
appends to the data a short check value that has
been created by a specific process from he data
itself. The receiver receives the data and the
check value. He creates a new check value from
the received data and compares the newly
created check value with the one received. If the
two check values are the same, the integrity of
data has been preserved.
 Traffic Padding : Traffic padding means insertion
of bits into gaps in a data stream to frustrate
traffic analysis attempts.*
Cryptographic Security
Security Mechanisms
 Routing Control : Routing control means
selecting and continuously changing different
available routes between the sender and the
receiver.
 Notarization : The use of a trusted third party to
assure certain properties of a data exchange. The
receiver can involve a trusted party to store the
sender request in order to prevent the sender
from later denying that he has made such a
request.
*
Cryptographic SecurityRelation between Security
Services and Security
Mechanism
*
Cryptographic Security
Cryptography – Basic Concepts
 Cryptography is the study of
Secret (crypto-) writing (-graphy)
 Cryptography
The art or science encompassing the principles
and methods of transforming an intelligible
message into one that is unintelligible, and then
retransforming that message back to its original
form.
 Plaintext
" The original intelligible message”
 Ciphertext
" The transformed message”
*
Cryptographic Security
Basic Concepts
 Cipher
An algorithm for transforming an intelligible
message into unintelligible by transposition
and/or substitution.
 Key
Some critical information used by the cipher,
known only to the sender & receiver.
 Encipher (encode)
The process of converting plaintext to ciphertext
 Decipher (decode)
The process of converting ciphertext back into
plaintext
*
Cryptographic Security
Basic Concepts
 Cryptanalysis
The study of principles and methods of
transforming an
unintelligible message back into an intelligible
message without knowledge of the key. Also
called codebreaking.
 Cryptology
Both cryptography and cryptanalysis
*
Cryptographic Security
Cryptography
*
plaintext (data file or messages)
encryption
ciphertext (stored or transmitted safely)
decryption
plaintext (original data or messages)

More Related Content

What's hot

Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemorySHIKHA GAUTAM
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPTAshutha K
 
Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapVikas Jagtap
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...PECB
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routingVikas Jagtap
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN@zenafaris91
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerAbdullaziz Tagawy
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 

What's hot (20)

Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtap
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
GSM Module
GSM ModuleGSM Module
GSM Module
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Ch3 physical layer.ppt
Ch3 physical layer.pptCh3 physical layer.ppt
Ch3 physical layer.ppt
 

Viewers also liked

CV update 19 Des 2015
CV update 19 Des 2015CV update 19 Des 2015
CV update 19 Des 2015iwan setiawan
 
Trabajo practico n 5 informatica
Trabajo practico n 5 informaticaTrabajo practico n 5 informatica
Trabajo practico n 5 informaticaFacundoReyes
 
Nate jackman bar serve
Nate jackman bar serveNate jackman bar serve
Nate jackman bar serveNathan Jackman
 
RESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENSRESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENSRohit Gupta
 
Profile of the one jsc
Profile of the one jscProfile of the one jsc
Profile of the one jscThe One JSC
 
One Health Initiative from Unisveristy to Stakeholder Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder   Noor ISMAILOne Health Initiative from Unisveristy to Stakeholder   Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder Noor ISMAILGlobal Risk Forum GRFDavos
 
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...Global Risk Forum GRFDavos
 
Smart Emission Control System
Smart Emission Control SystemSmart Emission Control System
Smart Emission Control Systempayal_dodeja
 
Final PPT Imdb (1)
Final PPT Imdb (1)Final PPT Imdb (1)
Final PPT Imdb (1)payal_dodeja
 
Sales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABMSales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABMDemandbase
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 

Viewers also liked (19)

CV update 19 Des 2015
CV update 19 Des 2015CV update 19 Des 2015
CV update 19 Des 2015
 
Trabajo practico n 5 informatica
Trabajo practico n 5 informaticaTrabajo practico n 5 informatica
Trabajo practico n 5 informatica
 
EnergyPlus
EnergyPlusEnergyPlus
EnergyPlus
 
Nate jackman bar serve
Nate jackman bar serveNate jackman bar serve
Nate jackman bar serve
 
Claudeolivier
ClaudeolivierClaudeolivier
Claudeolivier
 
Cntesfebrer
CntesfebrerCntesfebrer
Cntesfebrer
 
Test
TestTest
Test
 
RESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENSRESIDENTIAL MODULAR KITCHENS
RESIDENTIAL MODULAR KITCHENS
 
Profile of the one jsc
Profile of the one jscProfile of the one jsc
Profile of the one jsc
 
One Health Initiative from Unisveristy to Stakeholder Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder   Noor ISMAILOne Health Initiative from Unisveristy to Stakeholder   Noor ISMAIL
One Health Initiative from Unisveristy to Stakeholder Noor ISMAIL
 
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
Rebranding Antibiotic Resistance as a Disaster Risk Problem - A Necessary Ste...
 
Наука как блокбастер
Наука как блокбастерНаука как блокбастер
Наука как блокбастер
 
Hdlc
HdlcHdlc
Hdlc
 
Что происходит с космонавтикой?
Что происходит с космонавтикой?Что происходит с космонавтикой?
Что происходит с космонавтикой?
 
Smart Emission Control System
Smart Emission Control SystemSmart Emission Control System
Smart Emission Control System
 
Final PPT Imdb (1)
Final PPT Imdb (1)Final PPT Imdb (1)
Final PPT Imdb (1)
 
Polaris Product Fact Sheet
Polaris Product Fact SheetPolaris Product Fact Sheet
Polaris Product Fact Sheet
 
Sales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABMSales and Marketing Alignment: Bridging the Great Divide through ABM
Sales and Marketing Alignment: Bridging the Great Divide through ABM
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 

Similar to Cryptographic Security

Cryptography Network Security Introduction
Cryptography Network Security IntroductionCryptography Network Security Introduction
Cryptography Network Security IntroductionAlwyn Rajiv
 
Network Security
Network SecurityNetwork Security
Network Securitymoviebro1
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.pptSwapnaPavan2
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptxBisharSuleiman
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptxNISARSHAIKH57
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyUmangThakkar26
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network securitysneha padhiar
 
The Road Network security
The Road Network securityThe Road Network security
The Road Network securityKhaled Omar
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 

Similar to Cryptographic Security (20)

Cryptography Network Security Introduction
Cryptography Network Security IntroductionCryptography Network Security Introduction
Cryptography Network Security Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
The Road Network security
The Road Network securityThe Road Network security
The Road Network security
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

Cryptographic Security

  • 2. Cryptographic Security Security Goals *  Confidentiality : private or confidential information is not made available or disclosed to unauthorized individuals. In industry, hiding some information from competitors is crucial to the operation of the organization In banking, customers’ accounts need to be kept secret.  Integrity : Integrity means changes need to be done only by authorized entities and through authorized mechanisms. In a bank, when a customer deposits or withdraws money, the balance needs to be changed.  Availability : The information created and stored by an organization needs to be available to authorized entities.
  • 3. Cryptographic Security OSI security Architecture  Security Attack : Any action that compromises the security of the information.  Security Mechanism : A mechanism that is designed to detect, prevent or recover from a security attack.  Security Services : A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. *
  • 4. Cryptographic Security Security Attacks * Taxonomy of attacks with relation to security goa
  • 5. Cryptographic Security Attacks threatening to confidentiality  Snooping : It refers to unauthorized access to or interception of data. To prevent snooping data can be made non intelligible by using encryption techniques.  Traffic analysis : If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place.*
  • 7. Cryptographic Security Attacks threatening to integrity  Modification : After intercepting or accessing the information, the attacker modifies the information to make it beneficial to himself. A customer sends a message to a bank to do some transaction. The attacker intercepts the message and changes the type of transaction to benefit himself.  Masquerading : Masquerading, or spoofing, happens when the attacker impersonates somebody else. For example, an attacker might steal the bank card and PIN of a bank customer and pretend that he is a customer.*
  • 9. Cryptographic Security Attacks threatening to integrity  Replaying : The attacker obtains a copy of a message sent by a user and later tries to replay it. A person sends a request to his bank to ask for payment to the attacker, who has done a job for her. The attacker intercepts the message and sends it again to receive another payment from the bank.  Repudiation : It is performed by one of the two parties in the communication. The sender of the message might later deny that he has sent the message; the receiver of the message might later deny that he has received the message. The sender would be a bank customer asking her bank to send some money to a third party but later*
  • 11. Cryptographic Security Attacks threatening to availability  Denial of service : The attacker might intercept and delete a server’s response to a client, making the client to believe that the server is not responding. The attacker may also intercept requests from clients, causing the clients to send requests many times and overload the system. *
  • 12. Cryptographic Security Passive Vs Active Attacks  Passive attacks : The attacker’s goal is just to obtain information. He does not modify data or harm the system.  Active Attacks : An active attack may change the data or harm the system. * Attacks Passive/Active Threatening Snooping Traffic analysis Passive Confidentiality Modification Masquerading Replaying Repudiation Active Integrity Denial of Service Active Availability
  • 13. Cryptographic Security Security Services  ITU-T(X.800)[International Telecommunication Union-Telecommunication Standardization Sector] has defined five services related to the security goals and attacks.  Authentication: This service provides the authentication of the party at the other end of the line. Peer entity authentication: In connection oriented communication, it provides authentication of the sender or receiver during the connection establishment. Data origin authentication: In connectionless communication, it authenticates the source of the data. *
  • 14. Cryptographic Security Security Services  Data confidentiality : Data confidentiality is designed to protect data from disclosure attack. It is designed to prevent snooping and traffic analysis attack.  Data integrity : It is designed to protect data from modification, insertion, deletion and replaying by an adversary.  Nonrepudiation : Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. *
  • 15. Cryptographic Security Security Mechanisms  Encipherment : The use of mathematical algorithms to transform data into a form that is not readily intelligible.  Digital Signature : It is a means by which the sender can electronically sign the data and the receiver can electronically verify the signature.  Access control : Access control uses methods to prove that a user has access right to the data or resources owned by a system. Examples of proofs are passwords and PIN.  Authentication exchange : In authentication exchange, two entities exchange some message to prove their identity to each other. *
  • 16. Cryptographic Security Security Mechanisms  Data integrity : The data integrity mechanism appends to the data a short check value that has been created by a specific process from he data itself. The receiver receives the data and the check value. He creates a new check value from the received data and compares the newly created check value with the one received. If the two check values are the same, the integrity of data has been preserved.  Traffic Padding : Traffic padding means insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.*
  • 17. Cryptographic Security Security Mechanisms  Routing Control : Routing control means selecting and continuously changing different available routes between the sender and the receiver.  Notarization : The use of a trusted third party to assure certain properties of a data exchange. The receiver can involve a trusted party to store the sender request in order to prevent the sender from later denying that he has made such a request. *
  • 18. Cryptographic SecurityRelation between Security Services and Security Mechanism *
  • 19. Cryptographic Security Cryptography – Basic Concepts  Cryptography is the study of Secret (crypto-) writing (-graphy)  Cryptography The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form.  Plaintext " The original intelligible message”  Ciphertext " The transformed message” *
  • 20. Cryptographic Security Basic Concepts  Cipher An algorithm for transforming an intelligible message into unintelligible by transposition and/or substitution.  Key Some critical information used by the cipher, known only to the sender & receiver.  Encipher (encode) The process of converting plaintext to ciphertext  Decipher (decode) The process of converting ciphertext back into plaintext *
  • 21. Cryptographic Security Basic Concepts  Cryptanalysis The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking.  Cryptology Both cryptography and cryptanalysis *
  • 22. Cryptographic Security Cryptography * plaintext (data file or messages) encryption ciphertext (stored or transmitted safely) decryption plaintext (original data or messages)