20CS17 – INFORMATION SECURITY
LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING (AUTONOMOUS) Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230. DEPARTMENT OF INFORMATION TECHONOLGY |
INTRODUCTION
Program & Semester: B.Tech & VI SEM
Section: CSE-C
Academic Year: 2023 - 24
By
Mr M. Vijay Kumar
Sr Assistant Professor
Dept. of IT, LBRCE
1.Background
1.1 Definitions
Difference types of security threats are interruption, interception, fabrication and modification.
.
.
S.NO | THREAT | ATTACK |
1 | Can be intentional or unintentional | Is intentional |
2 | May or may not be malicious | Is malicious� � |
The difference between threat and attack are:
1.2 OSI Security Architecture
Information security is about protecting the information from unauthorized access, misuse, disclosure, destruction, modification, or disruption by using processes and methodologies which are designed and implemented for protecting information.
Three key objectives that are at the heart of computer security.
These three concepts form what is often referred to as the CIA triad.
The three concepts embody the fundamental security objectives for both data and for information and computing services.
To provide Information Security we should consider three aspects
a. Security Attacks
b. Security Mechanism
c. Security Services
Security attack:
Any action that compromises the security of information owned by an organization.
Security mechanism:
A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Security service:
A processing or communication service that enhances the
security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
1.3 Security Attacks
Attacks on the information can be classified into two categories
i. Passive attacks
ii. Active attacks
Passive Attacks
Passive attacks mainly focus on getting information by doing tapping or eavesdropping or monitoring etc..,
There are two types of passive attacks
a. Revealing formation
b. Traffic analysis
Passive attacks are difficult to identify.
Passive attacks are prevented rather than detecting.
Active attacks
Active attacks are major security threats. Unlike passive attacks these attacks mainly focus on alteration and false information. They are categorized into four
a. Masquerade
b. Replay
c. Message Modification
d. Denial of service
All attacks that are imposed on information can be of four types
Interruption
Interception
Modification
Fabrication
1.4 Security Services
“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”
“a processing or communication service provided by a system to give a specific kind of protection to system resources”
Security Services (X.800)
Assurance that the communicating entity is the one claimed
Prevention of the unauthorized use of a resource
Protection of data from unauthorized disclosure
Assurance that data received is as sent by an authorized entity
Protection against denial by one of the parties in a communication
1. 5 Security Mechanisms
Security Mechanisms (X.800)
Encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
Trusted functionality, security labels, event detection, security audit trails, security recovery
1.6 A Model for Network Security
Any Security model deals mainly with two aspects
There are mainly four important tasks for providing Security Service
The security mechanisms that provide access control falls into two categories
Gatekeeper Function
Internal Security controls
2. Conventional Encryption Techniques
Any Conventional Encryption Algorithm should posses five qualities
Plain text
Encryption Algorithm
Cipher text
Secret Key
Decryption Algorithm
along with these it should also satisfy two requirements
A Strong Encryption algorithm
A Secure way to transfer the Secret key
Basic Terminology
2.1Symmetric Encryption
Y = EK(X)
X = DK(Y)
Cryptography
Cryptography is the study of techniques related to aspects of information security. Hence cryptography is concerned with the writing (ciphering or encoding) and deciphering (decoding) of messages in secret code. Cryptographic systems are classified along three independent dimensions:
Cryptanalysis
2.2 Cryptanalytic Attacks
only know algorithm & ciphertext, is statistical, know or can identify plaintext
know/suspect plaintext & ciphertext
select plaintext and obtain ciphertext
select ciphertext and obtain plaintext
select plaintext or ciphertext to en/decrypt
Brute Force Search
2.3 Classical Substitution Ciphers
2.3.1Caesar Cipher
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Caesar Cipher
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
c = E(p) = (p + k) mod (26)
p = D(c) = (c – k) mod (26)
2.3.2 Monoalphabetic Cipher
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaint: ifwewishtoreplaceletters
Cipher : WIRFRWAJUHYFTSDVFSFUUFYA
2.3.3 Playfair Cipher
Playfair Key Matrix
Encrypting and Decrypting
2.3.4 Polyalphabetic Ciphers
polyalphabetic substitution ciphers
2.3.5 Transposition Ciphers
2.3.6 Steganography
2.4 Block Cipher Principles
Ideal Block Cipher
Block vs Stream Ciphers
2.5 Feistel Cipher Structure
Feistel Cipher Structure
�3. Conventional Encryption Algorithms�
�3. 1 Data Encryption Standard (DES)�
DES: Data Encryption Standard
Initial Permutation IP
Substitution Boxes [S-Box]
Strength of DES – Key Size
3.2 Advanced Encryption Standard (AES)
The AES Cipher
AES
Byte Substitution
Shift Rows
Mix Columns
Add Round Key
AES Round
AES Key Expansion
AES Decryption
AES Decryption
3.3 Multiple Encryption & DES
Double-DES?
3.3.1 Triple-DES
Triple-DES with Three-Keys
Modes of Operation
4. Modes of Operation
Initialization Vector (IV)�
4.1 Cipher Block Chaining (CBC)
Ci = DESK1(Pi XOR Ci-1)
C-1 = IV
Cont..
Cont..
Advantages and Limitations of CBC
4.2 Cipher FeedBack (CFB)
Ci = Pi XOR DESK1(Ci-1)
C-1 = IV
Cont..
Cipher Feedback (CFB)
Advantages and Limitations of CFB
5. Stream Ciphers
Cont..
Encryption
For Encryption,
Example:
Plain Text : 10011001
Keystream : 11000011
““““““““““`
Cipher Text : 01011010
Decryption
For Decryption,
Example:
Cipher Text : 01011010
Keystream : 11000011
“““““““““““
Plain Text : 10011001
�
Stream Cipher Structure
Stream Cipher Properties
6. RC4
RC4 Key Schedule
for i = 0 to 255 do
S[i] = i
T[i] = K[i mod keylen])
j = 0
for i = 0 to 255 do
j = (j + S[i] + T[i]) (mod 256)
swap (S[i], S[j])
RC4 Encryption
i = j = 0
for each message byte Mi
i = (i + 1) (mod 256)
j = (j + S[i]) (mod 256)
swap(S[i], S[j])
t = (S[i] + S[j]) (mod 256)
Ci = Mi XOR S[t]
RC4 Overview
RC4 Security
7. Placement of Encryption
Link
Placement of Encryption
End To End
Placement of Encryption
Encryption vs Protocol Level
Traffic Analysis
8. Key Distribution
Key Distribution
Given parties A and B have various key distribution alternatives:
Key Hierarchy
Key Distribution Scenario