Professional Documents
Culture Documents
Legal
requirements
Risk
management
"Informa
wide range of activities (and hence jobs): Inform
Defining the boundaries of Security:
Security involves elements such as computers, people,
locks, communication
and so Specialist,
on.
Security
Architect, IT links
Security
IT Se
The goals of security might involve authentication,Security
integrity, accountability
and
so
on.
Manager, Security Research (Technica
A security system may involve an arbitrary combination of these elements and goals.
Defining a system:
Product or component: such as a smartcard, a PC, or a communication protocol.
Collection: some products/components, and an OS, network, making up an organizations
infrastructure.
Application: the above and some set of applications.
Composite: the above and IT staff, and perhaps users, management, clients, customers...
Note: indeterminacy leads to confusion and errors
Card Skimmers:
Devices installed on ATMs to collect card details from the magnetic strips. PINs were obtained by
pinhole cameras, or an overlay over the keyboard.
Vulnerability/Threats: Vulnerability == Weakness > Threat == Harmful situation
Services/Goals:
Ensuring adequate service in a computer system. CIA
Attacks/Controls:
Attach = threat + vulnerability; A control is a way of reducing the effect of a
vulnerability. MOM
CIA(AA)
Confidentiality concealing information, resources may only be accessed by authorised parties
Integrity
trustworthiness of data, resources may only be modified by authorised parties
in authorised ways
Availability
preventing DOS/denial-of-service, resources are accessed in a timely manner
(Authenticity) logins, password checks
(Accountability) non-repudiation of a prior commitment
MOM
Method
Opportunity
Motive
tools, knowledge;
time, access;
what advantage is to be gained;
prevent
correct operation (denial-of-service/interruption)
studies
Case studies
usurpation
unauthorised
control
(spoofing/fabrication)
Types of attacks
Types of attacks
Snooping/Interception
Snooping/Interception
Alice
man-in-the-middle/modification
Man-in-the-middle/Modification
Bob
Administrivia
Setting the stage...
Case studies
Ted
Alice
Bob
Administrivia
Setting the stage...
Case studies
Ted
Types of attacks
Types of attacks
Spoofing/Fabrication
Denial of Service/Interruption
Denial-of-Service/interruption
Hugh Anderson
Introduction to Information and System Security First lecture
Alice
Spoofing/Fabrication
Hugh Anderson
Introduction to Information and System Security First lecture
Alice
Bob
Bob
Caesar cipher
1. 22 useful ciphers - useful keyspace of 22
c
p
=
=
E(k, p)
D(k, c)
=
=
(p + k) mod 23
(c k) mod 23
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
Text
Cipher
tableau
shown
If we can discoverVigenre
the length of
the repeated
key (in this case 3), and the text
5. Kasiski Method: Repetitions
in
ciphertext
give
clues
to
period
so find
same
plaintext
an exact Attacks, social enginee
is long enough, we can just consider the cipher
text to
be a group
of
Historical encryption schem
interleaved
monoalphabetic
substitution
ciphers
and
solve
accordingly.
period apart which results in the same ciphertext
Playfair cipher
One time pad/Vernam
Other ciphers
Playfair
cipher
improvement
over
monoalphabetic
cipher
Cryptanalysis
of
Vigenre
cipher:
Improvement over mono-alphabetic: the Playfair cipher.
Multiple ciphertext letters for each plaintext letter,
so letter
frequencies cipher
Oneand
time
pad/Vernams
Invented by Charles Wheatstone in 1854, named after Baron Playfair.
are obscured (but not totally lost)
5X5 matrix of letters based on a keyword.
the key is a sequence of random
Start with letter frequencies, see if monoalphabetic or not. If not, then need to
Fill rest of matrix with other letters eg. using the keyword MONARCHY:
key letters, each letter
used once
determine number of alphabets.
An "unconditionally
M
C
E
L
U
O
H
F
P
V
N
Y
G
Q
W
A
B
I/J
S
X
R
D
K
T
Z
Hugh Anderson
secu
One time
The key
letter use
sender a
if both letters fall in the same row, replace each with letter to right
(wrapping back to start from end)
if both letters fall in the same column, replace each with the letter
below it (wrapping to top from bottom)
otherwise each letter is replaced by the letter in the same row and
in the column of the other letter of the pair
Transposition cipher
Transposition/permutation ciphers:
Hide message by rearranging letter order.Have the same frequency distribution as the original text
Detect a transposition cipher with the frequencies of the letters, and letter pairs.
If the frequency of single letters in ciphertext is correct, but the frequencies of letter pairs is wrong,
then the cipher may be a transposition.
This sort of analysis can also assist in unscrambling a transposition ciphertext, by arranging the
letters in their letter pairs.
Rail-fence cipher:
Write message letters out diagonally over a number of rows then read off cipher row by row eg.
Encryption goals:
Confidentiality and Integrity
Encryption terminology:
plaintext, ciphertext
cipher: algorithm for transforming plaintext to ciphertext
key: info used in cipher known only to send/receiver
encipher/encrypt <-> decipher/decrypt
cryptography, cryptanalysis/codebreaking, cryptology
Cryptographic systems are characterised by:
the type of encryption operations used, the number of keys used, the way plaintext is processed
Attackers goals
Total break: able to find the key, strongest, also able to achieve partial break and distinguishability
Partial break: can determine some specific information about the plaintext (e.g. the fist bit)
Distinguishability: able to distinguish between encryption of two given plaintext, or between an
encryption of a given plaintext and a random string
Attach models, based on information known to attackers:
Ciphertext only:
The adversary has a collection of ciphertext c.
Known plaintext:
The adversary has a collection of plaintext m and their corresponding
ciphertext c.
Chosen plaintext: The adversary has temporary access to a black box. He can choose a
plaintext m and obtain the corresponding ciphertext c from the black box. He
can access the black box for a reasonable large amount of time.
Chosen ciphertext: same as chosen plaintext attack, but here, the adversary chooses the
ciphertext
and the blackbox gives the plaintext.
Scams, phishing
Terms, definitions, goals
Encryption
Symmetric and Asymmetric
PKI
Chosen text:
select
plaintext or ciphertext to en/decrypt
Symmetric key systems
Key systems
Symmetric key systems
Alice uses a key to send to Bob, who uses the same key...
(Encrypted)
Alice
P
(Plaintext)
Scams, phishing
E(Ki ,P)
Encryption
PKI
Bob
Terms, definitions,
P goals
*
Symmetric
and Asymmetric
(Plaintext)
symmetric key
Ki systems
Ki
(Harrythehacker)
Hugh Anderson
Bob
(Encrypted)
E(Kpub ,P)
Kpub
Alice uses K pubto encrypt
Kpriv
Harry
the
hacker
(Plaintext)
Kpriv
Kpub
Modes of operation
ECB Electronic Codebook
CFB Cipher Feedback;
CBC Cipher Block Chaining
AES - Advanced Encryption Standard
Checks the digital signature of the public key sent from the web server
Vspub key installed on the computer already, used to check the digital signature with the public key
Two parts: 1 part checking that you indeed have the real public key, 1 part signing the key
Block (data) key size
size
DES
64
3-DES
64
AES
Mechanicm
56 16 rounds
112 3 * 16 rounds
Round
Substitution/
permutation bits
same as above
same as above