Sei sulla pagina 1di 11

PAPER CONTEST CONDUCTED BY

Network Security
Using
Cryptography

NETWORK SECURITY USING CRYPTOGRAPHY

ABSTRACT: special-purpose Secure Networking

Network security is a complicated Devices. More over we are going to show

subject, historically only tackled by well- what are the best ciphers currently in use.

trained and experienced experts. However,


as more and more people become ``wired'', TERMINOLOGY:

an increasing number of people need to Cryptography: It is the study of secret

understand the basics of security in a (crypto-) writing (-graphy) that is secret

networked world. We are going to present writing. Simply it is an art of code

what are the common attacks against making.

security over network, Solutions for those • Plaintext: The original intelligible
attacks, Introduction of cryptography, message (i.e.: Original data)
Algorithms of Cryptography and some • Cipher text: The transformed message
• Cipher: An algorithm for transforming WHAT IS A NETWORK?
an intelligible message into one that is A “network” has been defined as “any
unintelligible by transposition and/or set of interlinking lines resembling a net, a
substitution methods network of roads, an interconnected
• Key: Some critical information used by system, a network of alliances”. This
the cipher, known only to the sender & definition suits well for network:
receiver A Computer Network is simply an

• Encipher: (Encode or Encrypt) The interconnected collection of autonomous

process of converting plaintext to cipher systems.

text using a cipher and a key. WHAT IS NETWORK SECURITY?

• Decipher: (Decode or Decrypt) The Network Security is one which

process of converting cipher text back making sure that nosy people could not

into plaintext using a cipher and a key either access or alter the information

• Cryptanalysis: It is a Science and Art of intended for the recipient.

code Breaking COMMON ATTACKS AGAINST SECURITY OVER


NETWORK
• Cryptology: Both cryptography and
•Tapping the wire: To get access to clear
cryptanalysis are called as cryptology.
text data and passwords
• Cryptographers: People who do
•Impersonation: To get unauthorized
cryptography
access to data or to create unauthorized e-
• Cryptanalyst: Practitioners of mails, orders, etc.
cryptanalysis. •Denial-of-service: To render network
resources non-functional.
•Replay of messages: To get access to
INTRODUCTION
information and change it in transit.
A basic understanding of computer
•Guessing of Keys Passwords: To get
networks is requisite in order to understand
access to encrypted data and passwords
the principles of network security. First of
•Virus: To destroy data.
all we have to know that
(Viral Information Resource Under
Seized).
SOLUTIONS FOR ATTACKS AGAINST SECURITY form in order to hide its meaning. The
OVER NETWORKS opposite transformation, which retrieves
•Encryption: To protect data and the original clear text, is the decryption.
passwords. The mathematical function used for
•Authentication: By using digital encryption and decryption is the
signatures and certificates this will do cryptographic algorithm or cipher.
verify who is sending data over the There are many drawbacks to
network. restricted ciphers. It is very difficult to keep
•Authorization: To prevent improper an algorithm a secret when many people
access of data over the network. use it.
•Integrity checking: To protect against For these reasons, the currently used
improper alteration of messages. algorithms are keyed, that is, the encryption
•Non-repudiation: To make sure that an and decryption makes use of a parameter,
action cannot be denied by the person who known as the key.
performed it. The key can be chosen from a set

CONCEPT OF CRYPTOGRAPHY of possible values, called the keyspace. The

To keeping your data and keyspace usually is huge, the bigger the

communications secure, techniques such as better.

encryption, decryption and authentication IMPORTANCE OF CRYPTOGRAPHY


are used. The key factor to strong Encryption provides confidentiality
cryptography is the difficulty of reverse to messages. When communicating over an
engineering. un-trusted medium, such as the Internet,
Strong cryptography means that you may also need, in addition to
the computational effort needed to retrieve •Confidentiality- Protection of information
your clear text messages without knowing disclosure by means of data encryption to
the proper keys makes the retrieval those who are not intended to receive it.
infeasible. •Authentication- A method for verifying
ENCRYPTION AND DECRYPTION - that the sender of a message is really who
CRYPTOGRAPHIC ALGORITHMS he or she claims to be. Any intruder
Encryption is the transformation of masquerading as someone else is detected
a clear text message into an unreadable by authentication.
•Integrity checking - A method for length blocks, then each block is
verifying that a message has not been encrypted/decrypted and the blocks are
altered along the communication path. Any grouped to get the plaintext/ciphertext.
tampered message sent by an intruder is 2.Stream ciphers: An encryption method
detected by an integrity check. that uses continuous input, as opposed to
•Non-repudiation–The possibility to prove fixed length blocks of data.
that the sender has really sent the message. The algorithms used in Block Ciphers:
Data
Secret key block Crypto key
SYMMETRIC OR SECRET-KEY
Block Size size bits
ALGORITHMS ciphers
(bits)
Symmetric algorithms are keyed algorithms Data Encryption
64 56
where the decryption key is the same as the Standards (DES)
International data
encryption key. These are conventional Encryption 64 128
algorithm (IDEA)
cryptographic algorithms where the sender Modular
and the receiver must agree on the key multiplication
128 128
Block
before any secured communication can take cipher (MMB)
place between them. Cellular automata
384 1088
cipher

SKIPJACK 64 80

The most significant use of IDEA is


in the freeware secure e-mail package
Pretty Good Privacy (PGP).
An example of a stream algorithm
is A5, The advantage of the symmetric
algorithms is their efficiency.

There are two types of symmetric They can be easily implemented in

algorithms: hardware. A major disadvantage is the

1.Block ciphers: A cryptosystem in which difficulty of key management. A secure

encryption/decryption is done on blocks of way of exchanging the keys must exist,

data. The full message is divided into fixed which is often very hard to implement.
ASYMMETRIC OR PUBLIC-KEY As the public key is available to anyone,
ALGORITHMS privacy is assured without the need for a
These algorithms address the major secure key-exchange channel. Parties who
drawback of symmetric ciphers, the wish to communicate retrieve each other's
requirement of the secure key-exchange public key.
channel. The idea is that two different keys AUTHENTICATION AND NON-REPUDIATION
should be used: USING DIGITAL SIGNATURES
An interesting property of the
Public key which, as the name implies, is
public-key algorithms is that they can
known to everyone, and
provide authentication. The private key is
Private key, which is to be kept in tight
used for encryption. Since anyone has
security by the owner.
access to the corresponding public key and
The private key cannot be determined from
can decrypt the message, This provides no
the public key.
privacy. However, it authenticates the
A clear text encrypted with the
message. If one can successfully decrypt it
public key can only be decrypted with the
with the claimed sender's public key, then
corresponding private key.
the message has been encrypted with the
A clear text encrypted with the
corresponding private key, which is known
private key can only be decrypted with the
by the real sender only. Thus, the sender's
corresponding public key.
identity is verified. Encryption with the
Thus, if someone sends a message
private key is used in Digital Signatures.
encrypted with the recipient's public key, it
The principle is shown in figure. Alice
can be read by the intended recipient only.
encrypts her message with her private key
The process is shown in figure where Alice
("signs" it), in order to enable Bob to verify
sends an encrypted message to Bob.
the authenticity of the message.
Going a step further, encrypting with the provide a unique digital "fingerprint" of the
private key gives non-repudiation too. message, that identifies it with high
Additionally, if a timestamp is included, confidence, much like a real fingerprint
then the exact date and time can also be identifying a person.
proven. There are protocols involving A hash function that takes a key as a
trusted third parties that prevent the sender second input parameter and its output
from using phony timestamps. depends on both the message and the key is
HASH FUNCTIONS called a Message Authentication Code
Hash functions (also called message (MAC), as shown in figure
digests) are fundamental to cryptography.
A hash function is a function that
takes variable-length input data and
produces fixed length output data (the hash
value), which can be regarded as the
"fingerprint" of the input. That is, if the
hashes of two messages match, it is highly Put simply, if you encrypt a hash, it
probable that the messages are the same. becomes a MAC. If you add a secret key to
Cryptographically useful hash a message, then hash the concatenation, the
functions must be one-way, which means result is a MAC. Both symmetric and
that they should be easy to compute, but asymmetric algorithms can be used to
infeasible to reverse. An everyday example generate MACs.
of a one-way function is mashing a potato; Hash functions are primarily used to
it is easy to do, but once mashed, assure integrity and authentication :
reconstructing the original potato is rather • The sender calculates the hash of the
difficult. message and appends it to the message.
A good hash function should also be • The recipient calculates the hash of the
collision-resistant. It should be hard to find received message and then compares the
two different inputs that hash to the same result with the transmitted hash.
value. As any hash function maps an input • If the hashes match, the message was not
set to a smaller output set, theoretically it is tampered with.
possible to find collisions. The point is to
• If the encryption key (symmetric or used. Encrypting all the messages in their
asymmetric) is only known by a trusted entirety would not yield noticeable benefits
sender, a successful MAC decryption and performance would dramatically
indicates that the claimed and actual decrease. The encryption of a hash with the
senders are identical. The Message* and private key is called a Digital Signature.
MAC* notations reflect the fact that the The encryption of a secret key with a public
message might have been altered while key is called a digital envelope. This is a
crossing the untrusted channel. common technique used to distribute secret
keys for symmetric algorithms.

RANDOM-NUMBER GENERATORS
An important component of a cryptosystem
is the random-number generator. Many
times random session keys and random
initialization variables (often referred to as
initialization vectors) are generated.
The quality, that is the randomness
of these generators, is more important than
you might think. The ordinary random
One could argue that the same result can be
function provided with most programming
obtained with any kind of encryption,
language libraries is good enough for
because if an intruder modifies an
games, but not for cryptography. Those
encrypted message, the decryption will
random-number generators are rather
result in nonsense, thus tampering can be
predictable; if you rely on them, be
detected. The answer is that many times
prepared for happy cryptanalysts finding
only integrity and/or authentication is
interesting correlations in your encrypted
needed, maybe with encryption on some of
output. The fundamental problem faced by
the fields of the message. Also encryption
the random-number generators is that the
is very processor-intensive. Examples
computers are ultimately deterministic
include the personal banking machine
machines, so real random sequences cannot
networks, where only the PIN’s are
be produced.
encrypted, however MAC’s are widely
As John von Neumann ironically Consider whether you need to provide
said: "Anyone who considers arithmetical this service, bearing in mind that it allows
methods of producing random digits is, of any user to attach an unauthorized host to
course, in a state of sin." That's why the your network. This increases the risk of
term “pseudorandom generator” is more attacks via techniques such as IP address
appropriate. spoofing, packet sniffing, etc. Users and
Cryptographically strong pseudorandom site management must appreciate the risks
generators must be unpredictable. It must involved. If you decide to provide walk-up
be computationally infeasible to determine connections, plan the service carefully and
the next random bit, even with total define precisely where you will provide it
knowledge of the generator. A common so that you can ensure the necessary
practical solution for pseudorandom physical access security.
generators is to use hash functions. This A walk-up host should be
approach provides sufficient randomness authenticated before its user is permitted to
and it can be efficiently implemented. access resources on your network. As an
Military-grade generators use specialized alternative, it may be possible to control
devices that exploit the inherent physical access. For example, if the service
randomness in physical phenomena. An is to be used by students, you might only
interesting solution can be found in the provide walk-up connection sockets in
PGP software. The initial seed of the student laboratories. If you are providing
pseudorandom generator is derived from walk-up access for visitors to connect back
measuring the time elapsed between the to their home networks (e.g., to read e-mail,
keystrokes of the user. etc.) in your facility, consider using a

SECURE NETWORK DEVICES separate subnet that has no connectivity to


the internal network.
SECURE MODEMS:
Keep an eye on any area that contains
WALK-UP NETWORK CONNECTIONS unmonitored access to the network, such as
By "walk-up" connections, we mean vacant offices. It may be sensible to
network connection points located to disconnect such areas at the wiring closet,
provide a convenient way for users to and consider using secure hubs and
connect a portable host to your network.
monitoring attempts to connect user back at a known telephone number.
unauthorized hosts. Once the remote user's system answers that
call, the connection is established, and the
MODEMS:
user is on the network. This works well for
If modem access is to be provided, this
folks working at home, but can be
should be guarded carefully. The terminal
problematic for users wishing to dial in
server , or network device that provides
from hotel rooms and such when on
dial-up access to your network needs to be
business trips.
actively administered, and its logs need to
Other possibilities include one-time
be examined for strange behavior. Its
password schemes, where the user enters
password need to be strong -- not ones that
his userid, and is presented with a
can be guessed. Accounts that aren't
``challenge,'' a string of between six and
actively used should be disabled. In short,
eight numbers. He types this challenge into
it's the easiest way to get into your network
a small device that he carries with him that
from remote: guard it carefully.
looks like a calculator. He then presses
1. Modem Lines Must Be Managed
enter, and a ``response'' is displayed on the
2. Dial-in Users Must Be Authenticated
LCD screen. The user types the response,
3. Call-back Capability
and if all is correct, he login will proceed.
4. All Logins Should Be Logged
These are useful devices for solving the
5. Choose Your Opening Banner
problem of good passwords, without
Carefully
requiring dial-back access. However, these
6. Dial-out Authentication
have their own problems, as they require
7. Make Your Modem Programming as
the user to carry them, and they must be
"Bullet-proof" as Possible
tracked, much like building and office keys.
Dial-back systems
There are some remote access systems CRYPTO-CAPABLE ROUTERS:

that have the feature of a two-part A feature that is being built into some
procedure to establish a connection. The routers is the ability to session encryption
first part is the remote user dialing into the between specified routers. Because traffic
system, and providing the correct userid traveling across the Internet can be seen by
and password. The system will then drop people in the middle who have the
the connection, and call the authenticated resources (and time) to snoop around, these
are advantageous for providing world, and is also the largest purchaser of
connectivity between two sites, such that computer hardware in the world.
there can be secure routes. Governments in general have always been
Other Network Technologies prime employers of cryptologists. The NSA
Technologies considered here probably possesses cryptographic expertise
include X.25, ISDN, SMDS, DDS and many years ahead of the public state of the
Frame Relay. All are provided via physical art, and can undoubtedly break many of the
links which go through telephone systems used in practice; but for reasons of
exchanges, providing the potential for them national security almost all information
to be diverted. Crackers are certainly about the NSA is classified.
interested in telephone switches as well as
in data networks! CONCLUSION

With switched technologies, use Cryptography has emerged as an

Permanent Virtual Circuits or Closed User alternative to protect Internet data and it

Groups whenever this is possible. does the job well. New cryptographic

Technologies which provide authentication products and technologies have been

and/or encryption (such as IPv6) are developed particularly for Internet

evolving rapidly; consider using them on applications. Thus these Crypto techniques

links where security is important. provide sophisticated, protected and


reliable networks for secure Data
Interchange over the networks.

WHAT IS THE NATIONAL SECURITY AGENCY BIBLIOGRAPHY:

(NSA)? Books Referred:

The NSA is the official  Balenson, D., Automated Distribution of

communications security body of the U.S. Cryptographic Keys

government. It was given its charter by  Bellovin, S. M., and Merrit. M., “Augmented

President Truman in the early 50's, and has Encrypted Key Exchange”

continued research in cryptology till the  Applied Cryptography by Bruce


present. The NSA is known to be the Schneier
largest employer of mathematicians in the
 Handbook of Applied Cryptography
by Alfred Menezes, Paul van Oorschot
and Scott Vanstone
 Bellare M. and Rogaway, P., “Optimal
Asymmetric Encryption”

Websites browsed:
 www.crypto.com
 www.cryptography.com
 www.infosyssec.net
 www.uow.edu.au
 www.amazon.com
 www.phptr.com
 www.csrc.nist.gov

Potrebbero piacerti anche