The document discusses network security and related concepts. It defines network security as protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It identifies key security goals of confidentiality, integrity and availability. Various security attacks like passive attacks that obtain information and active attacks that modify data are described. The document also outlines security services, mechanisms and basic cryptography terminology to provide network security.
Network security is important to protect vital information while allowing authorized access. Key aspects of network security include identifying vulnerabilities, threats like hackers and methods of attack, and implementing appropriate countermeasures. Common attacks include password attacks, viruses, and packet sniffing. Effective countermeasures include firewalls to control access, intrusion detection systems to monitor for exploits, IPsec and encryption to secure communications, and user education to address social engineering vulnerabilities. Comprehensive security requires backups, encryption, virus protection, firewalls, monitoring, training, and testing defenses.
PGP and S/MIME are two standards for securing email. PGP provides encryption and authentication independently of operating systems using symmetric and asymmetric cryptography. S/MIME uses X.509 certificates and defines how to cryptographically sign, encrypt, and combine MIME entities for authentication and confidentiality using algorithms like RSA, DSS, and 3DES. DKIM allows a sending domain to cryptographically sign emails to assert the message's origin and prevent spoofing, while the email architecture standards like RFC 5322 and MIME define message formatting and how attachments are represented.
The document outlines the goals of network security which are confidentiality, integrity, and availability. Confidentiality aims to hide data from unauthorized people through encryption. Integrity seeks to prevent unauthorized modification of data using hashing. Availability aims to prevent loss of access to resources for authorized users by developing efficient network design, preventing malicious activity like DDoS attacks, ensuring sufficient bandwidth, and removing duplex mismatches. The document was presented by an instructor from the Faculty of Computer Science at Kabul Education University to discuss network security goals and methods.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
This document discusses IP security (IPSec) protocols. IPSec is used to secure IP communications by authenticating and encrypting IP packets. It provides data integrity, authentication, and confidentiality. IPSec includes protocols like Authentication Header (AH) and Encapsulating Security Payload (ESP) to provide security services like data integrity, data authentication, and confidentiality. It also uses the Internet Key Exchange (IKE) for automated key management and Security Associations (SAs) to identify security parameters for authenticated secure communication.
Network security is important to protect vital information while allowing authorized access. Key aspects of network security include identifying vulnerabilities, threats like hackers and methods of attack, and implementing appropriate countermeasures. Common attacks include password attacks, viruses, and packet sniffing. Effective countermeasures include firewalls to control access, intrusion detection systems to monitor for exploits, IPsec and encryption to secure communications, and user education to address social engineering vulnerabilities. Comprehensive security requires backups, encryption, virus protection, firewalls, monitoring, training, and testing defenses.
PGP and S/MIME are two standards for securing email. PGP provides encryption and authentication independently of operating systems using symmetric and asymmetric cryptography. S/MIME uses X.509 certificates and defines how to cryptographically sign, encrypt, and combine MIME entities for authentication and confidentiality using algorithms like RSA, DSS, and 3DES. DKIM allows a sending domain to cryptographically sign emails to assert the message's origin and prevent spoofing, while the email architecture standards like RFC 5322 and MIME define message formatting and how attachments are represented.
The document outlines the goals of network security which are confidentiality, integrity, and availability. Confidentiality aims to hide data from unauthorized people through encryption. Integrity seeks to prevent unauthorized modification of data using hashing. Availability aims to prevent loss of access to resources for authorized users by developing efficient network design, preventing malicious activity like DDoS attacks, ensuring sufficient bandwidth, and removing duplex mismatches. The document was presented by an instructor from the Faculty of Computer Science at Kabul Education University to discuss network security goals and methods.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
This document discusses IP security (IPSec) protocols. IPSec is used to secure IP communications by authenticating and encrypting IP packets. It provides data integrity, authentication, and confidentiality. IPSec includes protocols like Authentication Header (AH) and Encapsulating Security Payload (ESP) to provide security services like data integrity, data authentication, and confidentiality. It also uses the Internet Key Exchange (IKE) for automated key management and Security Associations (SAs) to identify security parameters for authenticated secure communication.
Kerberos : An Authentication ApplicationVidulatiwari
This document presents an overview of Kerberos authentication protocol. Kerberos was developed at MIT to provide strong authentication on insecure networks. It uses a centralized authentication server and relies on symmetric encryption. The document describes the requirements for Kerberos, differences between versions 4 and 5, key concepts like tickets and authenticators, and the message exchanges involved in the authentication process. The strengths of Kerberos are highlighted as mutual authentication between clients and servers without sending passwords in plain text across the network.
This document discusses email security threats and options to improve security. The main threats to email security are loss of confidentiality from emails being sent in clear text over open networks and stored on insecure systems, lack of integrity protection allowing emails to be altered, and lack of authentication and non-repudiation. Options to improve security include encrypting server-client connections using POP/IMAP over SSH or SSL, and end-to-end encryption using PGP. PGP provides encryption for confidentiality and digital signatures for authenticity and non-repudiation. The document also discusses email-based attacks and spam, as well as the algorithms and authentication process used by PGP.
Authentication Application in Network Security NS4koolkampus
The document summarizes authentication methods including Kerberos and X.509. It outlines security concerns around confidentiality and timeliness. It provides an overview of how Kerberos works, including the authentication dialogue process. It also describes X.509 certificates and certification authorities. Recommended reading and websites on authentication topics are listed.
This document provides an overview of Kerberos, an authentication protocol used to securely identify clients within a non-secure network. It discusses Kerberos' design which includes clients, a Key Distribution Center (KDC) consisting of an authentication and ticket granting server, and services. It also defines common Kerberos terms and describes how Kerberos works by having the KDC issue tickets to allow clients access to services. Key features of Kerberos include centralized credential management and reduced protocol weaknesses. A limitation is that compromising the KDC puts the entire infrastructure at risk.
The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography
SSL is an acronym for Secure Sockets Layer. It is a protocol used for authenticating and encrypting web traffic. For web traffic to be authenticated means that your browser is able to verify the identity of the remote server.
Pretty Good Privacy (PGP) is strong encryption software that enables you to protect your email and files by scrambling them so others cannot read them. It also allows you to digitally "sign" your messages in a way that allows others to verify that a message was actually sent by you. PGP is available in freeware and commercial versions all over the world.
PGP was first released in 1991 as a DOS program that earned a reputation for being difficult. In June 1997, PGP Inc. released PGP 5.x for Win95/NT. PGP 5.x included plugins for several popular email programs.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
This document discusses data encryption methods. It defines encryption as hiding information so it can only be accessed by those with the key. There are two main types: symmetric encryption uses one key, while asymmetric encryption uses two different but related keys. Encryption works by scrambling data using techniques like transposition, which rearranges the order, and substitution, which replaces parts with other values. The document specifically describes the Data Encryption Standard (DES) algorithm and the public key cryptosystem, which introduced the innovative approach of using different keys for encryption and decryption.
This document provides an overview of cryptography. It begins with a brief history of cryptography from ancient times to modern computer cryptography. It then defines basic concepts like encryption, decryption, plaintext and ciphertext. It describes different types of cryptography including codes, ciphers, steganography and computer ciphers. It also discusses cryptanalysis, security mechanisms like encryption, digital signatures and hash algorithms. It concludes by explaining applications of cryptography in daily life like emails and secured communication between family members.
The Secure Inter-branch Payment Transactions case study describes the current electronic payment system used by General Bank of India to transfer funds between branches, which utilizes a central server but lacks strong security. Improvements are needed to add encryption, digital signatures for non-repudiation, and a public key infrastructure to securely distribute keys. Cryptographic toolkits and smart cards could also be incorporated into the system to enhance security of financial transactions transmitted over the private network.
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
SSL is a protocol that allows clients and servers to securely communicate over the internet. It uses public-key encryption to authenticate servers, optionally authenticate clients, and establish an encrypted connection to securely transmit data. The SSL handshake allows the client and server to negotiate encryption parameters to generate shared secrets and session keys, which are then used to encrypt all further communication during the SSL session. Common implementations of SSL include OpenSSL and Apache-SSL.
This document discusses the Kerberos authentication protocol. It provides a high-level overview of Kerberos, including its history, terminology, working, environment, database, and administrator. Kerberos provides strong authentication for physically insecure networks using trusted third parties and time-stamped tickets. While it ensures passwords are not sent in the clear, Kerberos is vulnerable if users choose poor passwords and relies on all machines being designed for its authentication.
An intruder is defined as an unauthorized individual or program that enters a computer system. There are three main types of intruders: masqueraders who penetrate access controls using a legitimate user's account; misfeasors who are legitimate users that access unauthorized data or resources; and clandestine users who seize supervisory control to evade auditing. Intrusion detection aims to identify intruders quickly before damage occurs through monitoring techniques like analyzing audit records of user activity and system logs.
The document discusses computer security concepts including classical encryption techniques and the OSI security architecture. It defines computer security as protecting the confidentiality, integrity and availability of information system resources. Confidentiality ensures private information is not disclosed, integrity ensures information is not altered without authorization, and availability ensures authorized parties can access information when needed. The document outlines security attacks like passive eavesdropping and active attacks that modify data. It also describes security services like authentication, access control, data confidentiality and integrity, non-repudiation and availability. Security mechanisms to provide these services include encryption, digital signatures and access control methods.
This document discusses various types of security attacks and mechanisms. It describes passive attacks like eavesdropping and traffic analysis, as well as active attacks like masquerading, replaying, modifying messages, and denial of service. It also covers security services like authentication, access control, data confidentiality, integrity, non-repudiation, and availability. Finally, it discusses standards for internet security including RFCs, the standardization process, and standard categories.
Kerberos : An Authentication ApplicationVidulatiwari
This document presents an overview of Kerberos authentication protocol. Kerberos was developed at MIT to provide strong authentication on insecure networks. It uses a centralized authentication server and relies on symmetric encryption. The document describes the requirements for Kerberos, differences between versions 4 and 5, key concepts like tickets and authenticators, and the message exchanges involved in the authentication process. The strengths of Kerberos are highlighted as mutual authentication between clients and servers without sending passwords in plain text across the network.
This document discusses email security threats and options to improve security. The main threats to email security are loss of confidentiality from emails being sent in clear text over open networks and stored on insecure systems, lack of integrity protection allowing emails to be altered, and lack of authentication and non-repudiation. Options to improve security include encrypting server-client connections using POP/IMAP over SSH or SSL, and end-to-end encryption using PGP. PGP provides encryption for confidentiality and digital signatures for authenticity and non-repudiation. The document also discusses email-based attacks and spam, as well as the algorithms and authentication process used by PGP.
Authentication Application in Network Security NS4koolkampus
The document summarizes authentication methods including Kerberos and X.509. It outlines security concerns around confidentiality and timeliness. It provides an overview of how Kerberos works, including the authentication dialogue process. It also describes X.509 certificates and certification authorities. Recommended reading and websites on authentication topics are listed.
This document provides an overview of Kerberos, an authentication protocol used to securely identify clients within a non-secure network. It discusses Kerberos' design which includes clients, a Key Distribution Center (KDC) consisting of an authentication and ticket granting server, and services. It also defines common Kerberos terms and describes how Kerberos works by having the KDC issue tickets to allow clients access to services. Key features of Kerberos include centralized credential management and reduced protocol weaknesses. A limitation is that compromising the KDC puts the entire infrastructure at risk.
The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography
SSL is an acronym for Secure Sockets Layer. It is a protocol used for authenticating and encrypting web traffic. For web traffic to be authenticated means that your browser is able to verify the identity of the remote server.
Pretty Good Privacy (PGP) is strong encryption software that enables you to protect your email and files by scrambling them so others cannot read them. It also allows you to digitally "sign" your messages in a way that allows others to verify that a message was actually sent by you. PGP is available in freeware and commercial versions all over the world.
PGP was first released in 1991 as a DOS program that earned a reputation for being difficult. In June 1997, PGP Inc. released PGP 5.x for Win95/NT. PGP 5.x included plugins for several popular email programs.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
This document discusses data encryption methods. It defines encryption as hiding information so it can only be accessed by those with the key. There are two main types: symmetric encryption uses one key, while asymmetric encryption uses two different but related keys. Encryption works by scrambling data using techniques like transposition, which rearranges the order, and substitution, which replaces parts with other values. The document specifically describes the Data Encryption Standard (DES) algorithm and the public key cryptosystem, which introduced the innovative approach of using different keys for encryption and decryption.
This document provides an overview of cryptography. It begins with a brief history of cryptography from ancient times to modern computer cryptography. It then defines basic concepts like encryption, decryption, plaintext and ciphertext. It describes different types of cryptography including codes, ciphers, steganography and computer ciphers. It also discusses cryptanalysis, security mechanisms like encryption, digital signatures and hash algorithms. It concludes by explaining applications of cryptography in daily life like emails and secured communication between family members.
The Secure Inter-branch Payment Transactions case study describes the current electronic payment system used by General Bank of India to transfer funds between branches, which utilizes a central server but lacks strong security. Improvements are needed to add encryption, digital signatures for non-repudiation, and a public key infrastructure to securely distribute keys. Cryptographic toolkits and smart cards could also be incorporated into the system to enhance security of financial transactions transmitted over the private network.
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
SSL is a protocol that allows clients and servers to securely communicate over the internet. It uses public-key encryption to authenticate servers, optionally authenticate clients, and establish an encrypted connection to securely transmit data. The SSL handshake allows the client and server to negotiate encryption parameters to generate shared secrets and session keys, which are then used to encrypt all further communication during the SSL session. Common implementations of SSL include OpenSSL and Apache-SSL.
This document discusses the Kerberos authentication protocol. It provides a high-level overview of Kerberos, including its history, terminology, working, environment, database, and administrator. Kerberos provides strong authentication for physically insecure networks using trusted third parties and time-stamped tickets. While it ensures passwords are not sent in the clear, Kerberos is vulnerable if users choose poor passwords and relies on all machines being designed for its authentication.
An intruder is defined as an unauthorized individual or program that enters a computer system. There are three main types of intruders: masqueraders who penetrate access controls using a legitimate user's account; misfeasors who are legitimate users that access unauthorized data or resources; and clandestine users who seize supervisory control to evade auditing. Intrusion detection aims to identify intruders quickly before damage occurs through monitoring techniques like analyzing audit records of user activity and system logs.
The document discusses computer security concepts including classical encryption techniques and the OSI security architecture. It defines computer security as protecting the confidentiality, integrity and availability of information system resources. Confidentiality ensures private information is not disclosed, integrity ensures information is not altered without authorization, and availability ensures authorized parties can access information when needed. The document outlines security attacks like passive eavesdropping and active attacks that modify data. It also describes security services like authentication, access control, data confidentiality and integrity, non-repudiation and availability. Security mechanisms to provide these services include encryption, digital signatures and access control methods.
This document discusses various types of security attacks and mechanisms. It describes passive attacks like eavesdropping and traffic analysis, as well as active attacks like masquerading, replaying, modifying messages, and denial of service. It also covers security services like authentication, access control, data confidentiality, integrity, non-repudiation, and availability. Finally, it discusses standards for internet security including RFCs, the standardization process, and standard categories.
This document provides an overview of information security concepts including types of security attacks, security services, security mechanisms, internet standards, buffer overflows, and a model for network security. It discusses passive attacks like eavesdropping and traffic analysis, as well as active attacks like masquerading, replay, message modification, and denial of service. It also outlines authentication, access control, data confidentiality, integrity, non-repudiation, and availability services.
Information security is about protecting data from unauthorized access or modification. The document discusses several key aspects of information security including security attacks (active and passive), security services (confidentiality, authentication, integrity, etc.), and security mechanisms (encryption, digital signatures, access control). It also defines common vulnerabilities and exposures (CVE), which is a list of known cybersecurity threats maintained by MITRE to help identify vulnerabilities.
The document provides an overview of communication network security. It defines three security goals of confidentiality, integrity, and availability. It also defines security attacks like cryptanalytic attacks and non-cryptanalytic attacks that threaten the security goals. The document discusses security services like confidentiality, integrity, authentication, non-repudiation, and access control. It relates these services to security mechanisms like encipherment, digital signatures, and access control. Finally, it introduces cryptography and steganography techniques used to implement security mechanisms.
The document discusses cryptographic security. It outlines security goals of confidentiality, integrity, and availability. It describes common security attacks like snooping, traffic analysis, modification, masquerading, replaying, denial of service, and their classification as passive or active. It also discusses security services like authentication, data confidentiality, data integrity, and nonrepudiation. Various security mechanisms are presented like encipherment, digital signatures, access control, and traffic padding that provide the security services and defend against different attacks. Basic concepts of cryptography like plaintext, ciphertext, ciphers, keys, encryption, and decryption are also introduced.
The document provides an introduction to cryptography, outlining key security objectives like confidentiality, integrity, and availability. It discusses security attacks, services, and mechanisms, explaining techniques like encryption, digital signatures, and access control. The document also covers cryptanalysis methods like known plaintext attacks that try to derive the encryption key from samples of plaintext and ciphertext.
The document provides an overview of the internet, including its history and evolution. It discusses how the internet began as ARPANET in 1959 and transitioned to use packet switching. It also describes common internet devices, security threats like interruption and modification, and security services like authentication, integrity, and availability. The roles of organizations in internet standardization are outlined, as well as common attacks like buffer overflows, format string vulnerabilities, and session hijacking.
This document discusses various aspects of network security. It outlines four key aspects:
1) Privacy - ensuring confidentiality of messages by encrypting transmissions so only the intended recipient can understand them.
2) Message integrity - ensuring data arrives at its destination exactly as sent with no changes, which is important for financial transactions.
3) Endpoint authentication - authenticating the identity of the sender to prevent impersonation.
4) Non-repudiation - providing proof of transmission to prevent senders from denying messages.
The document also discusses three levels of network security controls: physical, technical, and administrative. Physical controls restrict access to network infrastructure. Technical controls protect stored and transmitted data. Administrative controls manage user
This document provides an overview of network security concepts and techniques. It discusses security attacks like passive attacks involving eavesdropping and traffic analysis, and active attacks like masquerading, message modification, and denial of service. It also covers security services like confidentiality, authentication, integrity, access control, and non-repudiation. Common security mechanisms like encryption, digital signatures, access control lists, and authentication protocols are described. Models for secure network communication and protecting systems from unauthorized access are presented. The document outlines the contents of chapters that will cover topics such as encryption techniques, public-key cryptography, key management, hashing, digital signatures, and protocols for securing email, IP networks, and web traffic.
The document discusses various topics in network security including:
1. It describes the OSI security architecture and defines security attacks, mechanisms, and services.
2. It covers different types of security attacks like passive attacks and active attacks.
3. It discusses security services like authentication, access control, data confidentiality, and data integrity.
4. It provides an overview of classical encryption techniques like symmetric ciphers, substitution ciphers, transposition ciphers, and steganography.
This document provides an introduction to a course on network security offered by BITS Pilani. The course focuses on security mechanisms induced in networking systems through cryptographic techniques. It covers fundamental cryptography concepts and has prerequisites in computer networks, mathematics, and binary/hexadecimal systems. Evaluation will be based on numerical and system design problems. The document discusses security objectives of confidentiality, integrity and availability. It also outlines some standardization bodies that develop security standards and provides definitions of information security and related terms.
This document provides information about the CS 477 Computer Security course taught by Prof. W. A. Zuniga-Galindo. The course covers topics such as symmetric encryption, public-key encryption, PGP, security in networks, authentication applications, IP security, web security, and intruders/viruses. It will introduce basic security ideas and vocabulary, discuss examples of security violations like unauthorized access and message interception, classify security attacks as passive or active, and cover security services like confidentiality, authentication, and integrity. Student presentations will focus on specific security topics.
This document discusses types of attacks on computer and network security. It defines passive and active attacks. Passive attacks monitor systems for information without interaction and include interception and traffic analysis attacks. Interception involves unauthorized access to messages. Traffic analysis examines communication patterns. Active attacks make unauthorized changes and include masquerade, interruption, fabrication, session replay, modification, and denial of service attacks. Masquerade involves assuming another user's identity. Interruption obstructs communication. Fabrication inserts fake messages. Session replay steals login information. Modification alters packet addresses or data. Denial of service deprives access by overwhelming the target.
This document discusses types of attacks on computer and network security. It defines passive and active attacks. Passive attacks monitor systems without interaction and include interception and traffic analysis attacks. Interception involves unauthorized access to messages. Traffic analysis examines communication patterns. Active attacks make unauthorized changes and include masquerade, interruption, fabrication, session replay, modification, and denial of service attacks. Masquerade involves assuming another user's identity. Interruption obstructs communication. Fabrication inserts fake messages. Session replay steals login information. Modification alters packet addresses or data. Denial of service deprives access by overwhelming the target.
Big data analytics document discusses security attacks and services in computer networks. It describes passive attacks like traffic analysis that involve monitoring communications, and active attacks like masquerading and message modification that disrupt communications. It also outlines five security services: availability, access control, authentication, data confidentiality, and data integrity. Specific security mechanisms are also listed that can be implemented at different network layers, like encryption and digital signatures, to provide these security services and defend against attacks.
This document provides an introduction to key concepts in information security including confidentiality, integrity, availability, authentication, authorization, and nonrepudiation. It defines important security terms and describes different types of security attacks such as passive attacks, which observe information without modifying it, and active attacks, which can alter systems and resources. Specific active attack types like masquerade, modification of messages, replay, and denial of service are outlined. The document also discusses the differences between passive and active attacks, and provides examples of how concepts like encryption, authorization, and auditing can help prevent different types of security risks.
The document provides an overview of cryptography and network security concepts. It describes the key objectives of studying this topic as understanding security requirements like confidentiality, integrity, and availability. It also discusses types of security threats and attacks. The document summarizes the main cryptographic algorithms and security architecture. It defines security services like authentication, access control, data confidentiality, and data integrity. It also discusses security mechanisms, threats, and attacks in network security.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Liberal Approach to the Study of Indian Politics.pdf
Network Security
1. Network Security
• Security is the ability of a system to protect information and
system resources with respect to confidentiality and integrity.
• Computer security is the security applied to computer
peripherals (such as computers and Smartphone's) as well as
computer networks (such as private networks, including the
Internet and public networks).
• This field covers all processes and mechanisms to protect devices,
information and digital services against unauthorized or
unauthorized access, tampering or destruction (damage)
attempts.
• It is sometimes referred to as "cyber security" or "IT security“ or
Network Security
2. Security Goal
1. Confidentiality :
A security goal that defines procedures to hide information
from an unauthorized access.
Ensuring that information is not accessed by unauthorized
persons.
Confidentiality is concerned with preventing unauthorized
disclosure of sensitive information.
For Ex.
I. In the industry, the information of competitors must be
hidden so that the organization can function properly.
II. In banking, customers account need to be kept secret.
Confidentiality applies not only to the storage of information,
but also to the transmission of information.
Security Goals
Confidentiality
Integrity
Availability
3. 2. Integrity:-
Means that changes need to be done only by authorized entities
and through authorized mechanisms
information protected from unauthorized change is called
integrity.
For ex.
In a bank, when a customer deposit or withdraws money, the
balance of her account needs to be changed and only desired
customer know this.
Integrity violations do not necessarily result from malicious
behavior. System interruption (such as an increase in voltage)
may also cause unexpected changes in some information.
3. Authentication :-
Means assuring that a communication is authentic.
Ensuring that users are the person they claim to be.
4. Security
Attack
Passive
Releases of
message
contents
Traffic
Analysis
Active
Masquerade
Replay
Modification
of Message
Contents
Denial of
Service
Security Attacks
Any action that
compromises the security of
information owned by an
organization is security attack
or
An attack that threatening
the security goals of a system
is a security attacks.
According to G. J.
Simmons “Information security
is way to prevent attack or,
failing that, to detect attack in
information-based system
where in the information itself
has no meaningful physical
existence”.
Type
of
Attacks
5. A. Passive Attack
A type of attack in which the attacker’s goal is to obtain
information that is being transmitted. The attack does not modify
data or harm the system.
The nature of Passive attacks are eavesdropping on (जासूसी), or
monitoring of, transmissions.
The revealing or diagnose of the information may harm the sender
or receiver of the massage, but the system is not affected. Passive
attack can be prevented by encipherment of the data.
Two types of passive attacks are Release of message contents and
Traffic analysis.
1. Release Of Message Contents :- Unauthorized access to
confidential information or interception of data. Some time it is
also called snooping. For ex., Wiretapping to capture data in a
network. The unauthorized copying of files or programs.
6. Fig.1 Release Of Message Contents Fig.2 Traffic Analysis
2. Traffic Analysis:- In this, attacker observe the pattern of the
messages that is length of messages, frequency of massages
or network resources available. This kind of information is
helpful for getting knowledge about communication channel
and its capacity, or this information might be useful in
guessing the nature of the communication that was taking
place.
A B
C
Internet or other facility
C read content of the
massage from A to B
A B
C
Internet or other facility
Observe pattern of
messages from A to B
7. B. Active Attacks
• Active attacks involve some modification of the data stream or
the creation of a false stream. These attacks may changes the
data or harm the system. Active attacks are easier to detect than
to prevent because an attacker can start them in a verity of way.
• They are four types: Masquerade, Replay, Modification of
message, Denial of service.
I. Masquerade or Spoofing: happens when the attacker
impersonates somebody else. A masquerade takes place when
one entity pretends (imagine) to be different entities.
It uses a fake identity such a network identity to gain
unauthorized access to personal computer information through
legitimate access identification.
For Ex. An attacker take the bank card and PIN of a bank
customer and pretends (act as if) that she is that customer.
Sometimes the attacker pretends instead to be the receiver
entity.
8. • For Ex. A user tries to contact a bank, but another site pretends that
is the bank and obtains some information from the user.
Fig. Masquerade
2. Replay:- In this the attacker intercepts the message and resends it
again. That is the attacker obtains a copy of message sent by a user
and later tries to replay it.
C
A B
Message from C that
appear to be from A
Internet or other facility
C
A B
Capture messages from A
to B later replay message
to B
Fig. Replay
9. 3. Modification of message:-after intercepting or accessing
information, the attacker modifies the information to make it
beneficial to herself. It involves some change in original message
this mean that some portion of a legitimate message is altered,
delayed or reordered.
For Ex. A customer sends a message to a bank to do some
transaction. The attacker intercept the message and changes
the type of transaction to benefit herself.
Fig. Modification of message
3. Denial of Service:- सेवा से इनकार it may slow down or totally interrupt
the service of a system. The attacker can use several strategies
to achieve this. She might send so many false requests to a
server that the server crashes because of the heavy load.
Internet or other facility
C
A B
C modifies messages from
A to B
10. The attacker might intercept and delete a server’s response to a
client, making the client to believe that the server is not
responding.
For Ex. an unauthorized user might send too many login requests
to a server using random user ids one after the other in quick
succession, so as to flood the network and deny other legitimate
users from using the network facilities.
C
A B
C disrupt serves provided
by server and presser user A
to communicate B
Fig. Denial of Service
11. Security Services
International Telecommunication Union Telecommunication (ITU) X.800 defines a
security service as a service provided by the protocol system to
communicate on an open system to ensure sufficient security of
system or transfers of data.
We define security service as “a processing or communication
service that is provided by a system to give a specific kind of
protection to system resources; security services implement
security policies and are implemented by security mechanisms”.
X.800 divides these services into five categories :
Security Service
Authent
ication
Access
Control
Non
repudiation
Data
Integrity,
Data
Confide
ntiality
12. 1. Authentication: In the authentication service, we make sure that
communication is done reliably (faithfully) i.e. it verifies. In the
case of a single message, (e.g. a warning or alarm signal), function
of the authentication service to ensure that the message
originates from the creator of the complaint.
A. Peer entity authentication:- In connection oriented
communication, it provides authentication of the sender or
receiver during the connection establishment
B. Data origin authentication:- In connectionless communication, it
authenticates the source of the data
Authentication
Peer entity
authentication
Data origin
authentication
13. 2. Access control :- Provides protection against unauthorized access to
data. In the context of network security, access control is the ability
to limit and control the access to host systems and applications via
communications links. To do this, it is first necessary to identify or
verify each entity that attempts to access so that the access rights can
be customized for personal use.
3. Data Confidentiality:- Protect your data against unauthorized
disclosure/ broadcaster. Confidentiality is the protection of data
transmitted by passive attacks. It is possible to identify different
levels of protection with respect to the content of the data transfer.
Data Confidentiality
Connection
Confidentiality
Connectionless
Confidentiality
Traffic Flow
Confidentiality
Selective-Field
Confidentiality
14. A. Connection Confidentiality:-The protection of all user data on a
connection.
B. Connectionless Confidentiality:-The protection of all user data in
a single data block.
C. Selective-Field Confidentiality:-The confidentiality of selected
fields within the user data on a connection or in a single data
block.
D. Traffic Flow Confidentiality:-The protection of the information
that might be derived from observation of traffic flows.
4. Data Integrity :-The assurance that data received are exactly as
sent by an authorized entity (i.e.to protect data from
modification, insertion, deletion, or replaying by an adversary).
It may protect the whole message or part of the message.
15. i. Connection Integrity with Recovery:- It provides for the
integrity of all user data on a connection and detects any
modification, insertion, deletion, or replay of any data within
an entire data sequence, and tries to recover.
ii. Connection Integrity without Recovery:-As above, but
provides only detection without recovery.
iii. Selective-Field Connection Integrity:- It guarantees the
integrity of selected field within the user data in the
transmitted data block and determines the selected field to
be modified, inserted, deleted, or replayed.
iv. Connectionless Integrity:- It guarantees the integrity of a
single data block that is not connected and can take the
form of detection of data modification. In addition, a limited
form of replay detection can be provided.
v. Selective-Field Connectionless Integrity:-Provides for the
integrity of selected fields within a single connectionless
data block; takes the form of determination of whether the
selected fields have been modified.
16. 5. Non repudiation:-Non repudiation prevents either sender or
receiver from denying a transmitted message.
• Non repudiation, Origin:-Proof that the message was sent by the
specified party. when a message is sent, the receiver can prove
that the alleged sender in fact sent the message.
• Non repudiation, Destination:-Proof that the message was
received by the specified party. when a message is received, the
sender can prove that the alleged receiver in fact received the
message.
17. Security Mechanisms
A Security Mechanisms designed to detect, prevent, or recover
from a security attack. Examples of mechanisms are encryption
algorithms, digital signatures, and authentication protocols.
Security Mechanisms
Encipherment
Digital Signature
Routing Control
TrafficPadding
Authentication Exchange
Data Integrity
Access Control
Notarization
1. Encipherment:-it hiding or
converting data, it can provide
confidentiality. It also be used
to complement other
mechanisms to provide other
services. Two techniques are:
Cryptography
Steganography
18. 2. Digital Signature: a DS is a means by which the sender can
electrically sign the data and the receiver can electrically verify
the signature. The sender uses a process that involves showing
that she owns a private key related to the public key that she has
announced publicly. The receiver uses the sender’s public key to
prove that the message is indeed signed by the sender who claims
to have sent the message.
3. Access Control: Access control uses methods to prove that a user
has access right to the data or resources owned by a system. Ex.
Of proofs are passwords and PIN
4. Data Integrity: This mechanism appends to the data a short check
value (checksum) that has been created by a specific process from
the data itself. The receiver receives the data and the check value.
He creates a new check value from the received data and
compares it with previous value. If the two check values are the
same, the integrity of the data has been accepted.
19. 5. Authentication Exchange: In authentication exchange two parties
exchange some message to prove identify to each other or they
can show there some unique identity with each other. For ex. One
entity can prove that she knows a secret that only she is supposed
to know.
6. Traffic Padding: Traffic padding means inserting some bogus (false)
data into the data traffic to fail the attacker’s attempts of traffic
analysis.
7. Routing Control: Routing control means selecting and continuously
changing different available routers between the sender and the
receiver to prevent the attacker from eavesdropping on a
particular route.
8. Notarization: Notarization means selecting a third trusted party to
control the communication between two entities. This can be
done, for example, to prevent repudiation. The receiver can
involve a trusted party to store the sender request in order to
prevent the sender from later denying that she has made such a
request.
20. Basic Terminology
• Plaintext:- The original form of a message is
known as plaintext or we can say that plaintext is
the original intelligible message or data that is fed
into the algorithm as input.
• Ciphertext: The message that is sent through the
channel is called ciphertext. This is the scrambled
message produced as output. It depends on the
plaintext and the secret key. For a given message,
two different keys will produce two different
ciphertext. The ciphertext is an actually random
stream of data and, as it stands, is unintelligible.
• Encryption : it is a method of transforming original
data(plaintext) into unreadable form (ciphertext).
Encryption
Plaintext Ciphertex
t
21. • Decryption: it is a method of transforming unreadable data
(ciphertext) into original data(plaintext) .
• Encryption Algorithm To create the ciphertext from the
plaintext, we use an encryption method and a shared secret
key is called encryption algorithm. (two simple forms of
encryption: substitutions in which one letter is exchanged
for another and transpositions, in which the order of the
letters is rearranged. )
• Decryption Algorithm : To create the plaintext from the
ciphertext, we use a decryption method and same shared
secret key is called Decryption algorithm.
• Ciphers: Encryption and decryption algorithm is called
ciphers.
• Key: A key is a set of values(numbers) that the cipher, as an
algorithm, operates on.
Decryption
Plaintext
Ciphertex
t
22. • Mono alphabetic substitution cipher:
Relationship between cipher text symbol and plain text symbol is 1:1.
• Additive cipher:
• Key value is added to plain text and numeric value of key ranges from 0 – 25.
• Example:
• Plain text(P)- H E L LO (H=7,E=4,L=11,L=11,O=14)
• Key (K)=15
• Cipher text (C)= 7+15,4+15,11+15,11+15,14+15 = 22,19, 26,26,(29%26)=3
= W T AAD
23. • Cryptography:- Cryptography is a Greek word means
“secret writing”. Cryptography refers to the science and art
of secret writing of transforming message to make them
secure and protected to attacks.
• If P is a plaintext, C is the ciphertext, and K is the key then
Encryption: C=Ek(P)
Decryption: P=Dk(C)
Cryptography are two types
(1) Symmetric-key: If both sender and receiver use the same
key, the system is referred to as symmetric, single-key,
secret-key, or conventional encryption.
(2) Asymmetric-key : If the sender and receiver use different
keys, the system is referred to as asymmetric, two-key, or
public-key encryption.
• Cryptanalysis-As cryptography is the science and art of
crating secret code while cryptanalysis is the science and
art of breaking those codes.
24. Classical Encryption Techniques
• Symmetric Cipher Model
• Substitution Techniques
• Transposition Techniques
• Steganography
1. Symmetric Cipher Model: A symmetric encryption scheme
has five ingredients (element):Plaintext, Ciphertext,
Encryption algorithm, Decryption algorithm, Secret key.
Feature we do not need to keep the algorithm secret; we
need to keep only the key secret.
2. Substitution Techniques: A substitution technique is one in
which the letters of plaintext are replaced by other letters or
by numbers or symbols. If the plaintext is viewed as a
sequence of bits, then substitution require replacing plaintext
bit patterns with ciphertext bit patterns. There are following
types of substitution techniques.
25. I. Caesar Cipher: The Caesar cipher involves replacing
each letter of the alphabet with the letter standing
three places further down the alphabet. For
example,
plain: meet me after the toga party
cipher: PHHW PH DIWHU WKH WRJD SDUWB
Let us assign a numerical equivalent to each letter:
Then the algorithm can be expressed as follows. For each
plaintext letter p, substitute the ciphertext letter C:
C = E(3, p) = (p + 3) mod 26
A shift may be of any amount, so that the general Caesar
algorithm is
26. C = E(k, p) = (p + k) mod 26
where k takes on a value in the range 1 to 25. The decryption
algorithm is simply
p = D(k, C) = (C k) mod 26
Three important characteristics of are
The encryption and decryption algorithms are known.
There are only 25 keys to try.
The language of the plaintext is known and easily recognizable.
• Monoalphabetic Ciphers: Relationship between cipher text symbol and
plain text symbol is 1:1.
• Key value is added to plain text and numeric value of key ranges from 0
– 25.
Example:
Plain text(P)- H E L LO (H=7,E=4,L=11,L=11,O=14)
Key (K)=15
Cipher text (C)= 7+15,4+15,11+15,11+15,14+15
= 22,19, 26,26,(29%26)=3
= W T A AD
27. • Polyalphabetic substitution cipher : In polyalphabetic cipher each
occurrence of a character may have different substitution. The
relationship between characters in plain text and cipher text is 1 to many.
• Playfair cipher
• Hill cipher
• Auto key cipher
• Vigenere cipher
• Playfair cipher :In playfair cipher the secret key is made of 25 characters
arranged in 5x5 matrix :
• Rules:-
If 2 letters in a plaintext are located in the same row of the secret key then the
corresponding encrypted character for each letter is next letter to the right.
If 2 letters in a pair are in same column then the corresponding encrypted
character is next below in the same column.
If 2 letters are neither in same row or in same column then encrypted character
is in its own row but in the same column as the other character.
28. • For Ex. Let us encrypt the plaintext “hello” using
the key given below
We dropped the letter in the matrix diagonally starting
from the top right-hand corner. Before encryption, if two letter in a pair are the
same, a bogus letter is inserted to separate them. After inserting bogus letter, if
the number of characters in the plaintext is odd, one extra bogus character is
added at the end to make the number of character even.
• Solution: First make pair, we get “he, ll, o”. We need to insert a X between two
ll. Hence pair is “he, lx, lo”
he--> EC lx-->QZ lo-->BX
Hence cipher: ECQZBX
29. • Auto key cipher:
In this cipher, key is stream of subkeys in which subkey is used to
encrypt the corresponding character in the plain text.
Here 1st subkey is predefined and 2nd subkey is the value of the
1st character of the plain text 3rd subkey is the value of the 2nd
plain text and so on.
• Ex. If the initial key value=12 and plaintext is
“attack is today” then ciphertext is
30. • Plaintext= “she is listening” and initial key
stream=Pascal
Solution: Since the key stream
Pascal(15,0,18,2,0,11) is the repetition of this
initial key stream as many times as needed.
• Hill Cipher: The encryption algorithm takes m
successive plaintext letters and substitutes for
31. • c1 = (k11P1 + k12P2 + k13P3) mod 26
• c2 = (k21P1 + k22P2 + k23P3) mod 26
• c3 = (k31P1 + k32P2 + k33P3) mod 26
• This can be expressed in term of column vectors
and matrices:
Or
• C = KP mod 26, where C and P are column vectors
of length 3, representing the plaintext and
ciphertext, and K is a 3 x 3 matrix, representing
32. The first three letters of the plaintext are
represented by the vector
33. • Transposition ciphers: it changes the location of the symbols. A
symbol in the first position of the plaintext may appear in the tenth
position of the ciphertext. A symbol in the eighth position in the
plaintext may appear in the first position of the ciphertext. In other
words, a transposition cipher reorders (transposes) the symbols.
1. Keyless transposition ciphers
2. keyed transposition ciphers
3. Combining two approaches
• Keyless transposition ciphers: There are two methods for
permutation of characters. In the method, the text is written into
a table column by column and then transmitted row by row. In the
second method, the text is written into the table row by row and
then transmitted column by column.
• Good ex. Is rail fence cipher. In this plaintext is arranged in two
lines as zigzag pattern, the ciphertext is created reading the pattern
row by row.
34. • Plaintext:"meet me after the toga party“
Key: rail fence cipher
Solution row by row
mematrhtgpryetefeteoaat
• Plaintext:"meet me after the toga party“
Key: rail fence cipher
Solution column by column
mmthgreeeeateartpytftoa
35. • Keyed transposition cipher: in this divide the
plaintext into groups of predetermined size,
called blocks, and then use a key to permute the
characters in each block separately.
• Plaintext: “enemy attacks tonight”
• solution
36. • Steganography: The word steganography, with origin in
Greek, mean “covered writing”, in contrast with cryptography,
which means “secret writing”. Cryptography means hiding the
contents of a message by enciphering; while steganography means
hide the message itself by covering it with something else.
• Today, any form of data, such as text, image, or video, can be
digitized, and it is possible to insert secret binary information into
the data during digitization process. Such hidden information is
not necessarily used for secrecy; it can also be used to protect
copyright, prevent tampering, or add extra information.
• It can be implemented using text cover or image cover.
• Text cover: the cover of secret data can be text. There are several
ways to insert binary data into an safe text. We can use single
space between words to represent the binary digit 0 and double
space to represent binary digit 1.
37. • Plaintext:
“this book is mostly about cryptography and not steganography”
• Steganography: text cover
Solution: That is steganography message is
“this book is mostly about cryptography and not steganography”
0 1 0 0 0 0 0 1
But he write as
“this book is mostly about cryptography and not a steganography”
because the message 01000001 in ASCII code mean A.
Image cover: secret data can also be covered under a color image.
Digitized images are made of pixels in which data can be hidden.
• Invisible ink: A number of substances can be used for writing but
leave no visible trace until heat or some chemical is applied to the
paper.(lemon juice)
38. • Character marking: Selected letters of printed or typewritten text
are overwritten in pencil. The marks are ordinarily not visible
unless the paper is held at an angle to bright light.
• Pin punctures: Small pin punctures on selected letters are
ordinarily not visible unless the paper is held up in front of a light.
Cryptanalysis : A cryptography is the science and art of creating
secret codes while cryptanalysis is the science and art of breaking
those code. Cryptanalysis does not needed to break the code of
others only, but it is necessary to understand the weakness of our
cryptosystem. The study of cryptanalysis helps us to develop
better secret code. Cryptanalytic attacks depend on the nature of
the algorithm as well as knowledge of the general characteristics
of the plaintext. This type of attack uses the properties of the
algorithm to try to guess a certain plain text and guess the used
key. They are four types.
39. I. Ciphertext-only
II. Known-plaintext
III. Chosen-plaintext
IV. Chosen-ciphertext
I. Ciphertext-only :In this types of attack, attacker
has access to only to the ciphertext and tries to
find the corresponding key and the plaintext.
The hypothesis is that attacker knows the
algorithm and can intercept the ciphertext.
They are basically three types
I. Brute-Force Attack
II. Statistical attack
40. III. Chosen-plaintext: it is similar to known-
plaintext attack, but the plaintext/ciphertext
pair have been chosen by the attacker herself.
IV. Chosen-ciphertext: This is similar to the chosen-
plaintext attack, except that attacker chooses
some ciphertext and decrypts it to form a
ciphertext/plaintext pair.