Chapter (1) Mine
Chapter (1) Mine
Chapter (1) Mine
INTRODUCTION
CSCB223 Cryptography 1
Outline
Why Information Security and
Cryptography?
Security Risks
Security Services
Fundamentals of Cryptosystems
CSCB223 Cryptography 2
WHY INFORMATION SECURITY
AND CRYPTOGRAPHY?
CSCB223 Cryptography 3
Refers to the
protection of
information and
information systems
Development of computer
networks, particularly Internet, has
increased the generation, access,
exchange and store of large amount
of data and Information.
• conducted electronically
• transmitted and stored in
insecure environment.
CSCB223 Cryptography 4
Cryptography is not a new science.
Has been used for centuries to
protect sensitive information,
especially during periods of conflict
Cryptography is:
• A tremendous tool
• The basis for many security mechanisms
Cryptography is NOT:
• The solution to all security problems
• Reliable unless implemented and used properly
• Something you should try to invent yourself
• many examples of broken ad-hoc designs
CSCB223 Cryptography 5
Security Issues
• How can we tell whether an email from a potential client
is a genuine inquiry from the person that it claims to
have come from?
https://www.csoonline.com/article/3441220/marriott-data-breach-faq-how-
did-it-happen-and-what-was-the-impact.html
CSCB223 Cryptography 7
The Role of Cryptography
in Information Security
• Cryptography can be used to achieve several goals
of information security, including confidentiality,
integrity, and authentication.
CSCB223 Cryptography 8
Confidentiality:
Confidentiality means ensuring that information is only accessible to those
who are authorized to view it, protecting private or sensitive data from
unauthorized access and disclosures.
CSCB223 Cryptography 9
Integrity:
Integrity in information security refers to maintaining the accuracy and
consistency of data across its lifecycle, ensuring that information is not altered
by unauthorized individuals and remains reliable and trustworthy.
CSCB223 Cryptography 10
Authentication:
Authentication is the process of verifying the identity of a
user or device, typically before granting access to a system
or network, ensuring that individuals are who they claim to
be.
CSCB223 Cryptography 11
Outline
Why Information Security and
Cryptography?
Security Risks
Security Services
Fundamentals of Cryptosystems
CSCB223 Cryptography 12
SECURITY RISKS
CSCB223 Cryptography 13
Vulnerability – Threat - Risk
Vulnerability Threat Risk
Definition Weaknesses or gaps in a Anything that can The potential for
security program that exploit a vulnerability, loss, damage or
can be exploited by intentionally or destruction of an
threats to gain accidentally, and asset as a result of
unauthorized access to obtain, damage, or a threat exploiting
an asset destroy an asset a vulnerability
Example 1 Terminated employee Access the company’s Unauthorized
ID’s are not removed network and retrieve disclosure of
from the system proprietary info sensitive business
information
Example 2 Improper maintenance of Fire Loss of life, data
fire fighting equipment and infrastructure
Example 3 No security guard Intruder Theft
Example 4 Poor access control Disgruntled employee Data modified
Example 5 Inadequate preparation Flood Loss of life, data
and infrastructure
CSCB223 Cryptography 14
Threats and Attacks (RFC 4949)
Threat
• A potential for violation of security,
which exists when there is a
circumstance, capability, action, or
event that could breach security and
cause harm. That is, a threat is a
possible danger that might exploit a
vulnerability.
Attack
• An assault on system security that
derives from an intelligent threat;
that is, an intelligent act that is a
deliberate attempt (especially in the
sense of a method or technique) to
evade security services and violate
the security policy of a system.
CSCB223 Cryptography 15
Security Attacks
CSCB223 Cryptography 16
Passive Attacks
Definition & Objective
Passive attacks are a type of security threat
that aims to learn or exploit information from
a system without affecting system resources.
Here are some key points about passive
attacks:
18
CSCB223 Cryptography 18
Passive Attacks
Prevention
Encryption: Encrypting sensitive data and
communication channels can protect information from
being intercepted and exploited during passive attacks.
CSCB223 Cryptography 19
Active attacks
Active attacks involve the modification of data streams or the
creation of false data streams with the intention of disrupting
system operations, altering information, or impersonating
legitimate entities. Here are key points about active attacks:
• Characteristics:
CSCB223 Cryptography 20
Types of Active Attacks:
CSCB223 Cryptography 21
Active Attacks
Prevention
• Intrusion Detection Systems: Implementing
intrusion detection systems can help detect
and respond to active attacks by monitoring
network traffic and system behavior for
suspicious activities.
• Access Controls: Enforcing strong access
controls, authentication mechanisms, and
authorization policies can prevent
unauthorized users from carrying out active
attacks.
• Data Validation: Validating input data, using
secure communication protocols, and
implementing encryption can help protect
against data modification and tampering.
CSCB223 Cryptography 22
Outline
Why Information Security and
Cryptography?
Security Risks
Security Services
Fundamentals of Cryptosystems
CSCB223 Cryptography 23
SECURITY SERVICES
CSCB223 Cryptography 24
Security Service
CSCB223 Cryptography 25
Security Service
Definition:
X.800: Security services are defined as
services provided by a protocol layer in
open systems to ensure the security of
systems or data transfers .
RFC 4949: Security services are described
as processing or communication services
offered by a system to provide specific
protection to system resources .
CSCB223 Cryptography 26
of Security Services
Types
Confidentiality: Ensures that data is kept private and protected from unauthorized access
through encryption and access controls.
Integrity: Guarantees that data remains unchanged and unaltered during storage,
processing, or transmission through mechanisms like hash functions and digital signatures.
Access Control: Manages and restricts access to resources based on user permissions, roles,
or policies to prevent unauthorized activities.
Availability: Ensures that systems, services, and data are accessible and operational when
needed, protecting against denial of service attacks and disruptions.
CSCB223 Cryptography 27
Outline
Why Information Security and
Cryptography?
Security Risks
Security Services
Fundamentals of Cryptosystems
CSCB223 Cryptography 28
FUNDAMENTALS OF
CRYPTOSYSTEMS
CSCB223 Cryptography 29
Model for Network Security
CSCB223 Cryptography 30
Model for Network Security (cont.)
• A message is to be transferred from one party to another across
some sort of Internet service.
• Security aspects come into play when it is necessary or desirable to
protect the information transmission from an opponent who may
present a threat to confidentiality, authenticity, and so on. All the
techniques for providing security have two components:
Some secret information shared by
A security-related transformation
the two principals and, it is hoped,
on the information to be sent
Unknown to the opponent
• E.g.: The encryption of the • E.g.: An encryption key used in
message, which scrambles the conjunction with the
message so that it is unreadable transformation to scramble the
by the opponent, and the addition message before transmission and
of a code based on the contents unscramble it on reception.
of the message, which can be
used to verify the identity of the
sender.
CSCB223 Cryptography 31
Simplified Model of Symmetric Encryption
Plaintext Enciphering/encryption
• An original message • The process of converting from
Ciphertext plaintext to ciphertext
• The coded message Deciphering/decryption
Secret Key • Restoring the plaintext from the
• Independent of the plaintext & algorithm ciphertext
CSCB223 Cryptography 32
Fundamentals of Cryptosystems
CRYPTOGRAPHY: the design and analysis of mechanisms
based on mathematical techniques that provide
fundamental security services.
• More accurate term is cryptology (cryptography +
cryptanalysis)
Cryptology
Cryptographers Cryptanalysts
Areas of cryptography
People who do Practitioners of
and cryptanalysis
cryptography cryptanalysis
together
CSCB223 Cryptography 33
Fundamentals of Cryptosystems (cont.)
CSCB223 Cryptography 34
Fundamentals of Cryptosystems (cont.)
CSCB223 Cryptography 36
Fundamentals of Cryptosystems (cont.)
CSCB223 Cryptography 37
Basic Principle of Cryptography
• In order to encrypt a plaintext (P) into a cipher
text (C), one requires:- C = E(Ke,P)
- the use of encryption algorithm (E)
- often the use of a secret encryption key (Ke)
• Vice versa, in order to decrypt a cipher text
(C) back into the original plaintext (P), one
requires:-
- the use of decryption algorithm (D) P = D(Kd,C)
- often the use of a secret decryption key (Kd)
**Note the word ‘often’. This is because there are cryptosystems that do not
require the use of Ke and Kd, known as keyless cipher.**
CSCB223 Cryptography 38
Two Types of Cryptosystem
SYMMETRIC PUBLIC KEY
CRYPTOSYSTEM CRYPTOSYSTEM
CSCB223 Cryptography 39
Summary
• Why Information • Security services
Security and – Authentication
Cryptography? – Access Control
– Data confidentiality
– Security issues
– Data integrity
• Security risks – Nonrepudiation
– Security attacks • Fundamental of
• Passive attacks
cryptosystems
• Active attacks
CSCB223 Cryptography 40