Sei sulla pagina 1di 41

Cryptography and Network

Security

CS-801D
IT-801D
Credits -3
Total Lectures – 38 (Defined)
Syllabus
• Module1: Attacks on Computers & Computer Security (5L)
• Introduction, Need for Security, Security approaches, Principles of Security, Types of attack.
• Module2: Cryptography: Concepts & Techniques (7L)
• Introduction, Plaintext & Cipher text, Substitution Techniques, Transposition Techniques, Encryption & Decryption,
• Symmetric & Asymmetric key Cryptography, Key Range & Key Size
• Module3: Symmetric Key Algorithm (8L)
• Introduction, Algorithm types & Modes, Overview of Symmetric Key Cryptography, DES(Data Encryption Standard)
• algorithm, IDEA(International Data Encryption Algorithm) algorithm, RC5(Rivest Cipher 5) algorithm.
• Module4: Asymmetric Key Algorithm, Digital Signature and RSA (5L)
• Introduction, Overview of Asymmetric key Cryptography, RSA algorithm, Symmetric & Asymmetric key
Cryptography
• together, Digital Signature, Basic concepts of Message Digest and Hash Function (Algorithms on Message Digest and
Hash
• function not required).
• Module5: Internet Security Protocols, User Authentication (6L)
• Basic Concepts, SSL protocol, Authentication Basics, Password, Authentication Token, Certificate based
Authentication,
• Biometric Authentication.
• Module6 : Electronic Mail Security (4L)
• Basics of mail security, Pretty Good Privacy, S/MIME.
• Module7: Firewall (3L)
• Introduction, Types of firewall, Firewall Configurations, DMZ Network
Books to study
• Text :
• 1. “Cryptography and Network Security”, William Stallings, 2nd Edition,
Pearson Education Asia
• 2. “Network Security private communication in a public world”, C. Kaufman,
R. Perlman and M. Speciner,
• Pearson
• 3. Cryptography & Network Security: Atul Kahate, TMH.
• Reference :
• 1. “Network Security Essentials: Applications and Standards” by William
Stallings, Pearson
• 2. “Designing Network Security”, Merike Kaeo, 2nd Edition, Pearson Books
• 3. “Building Internet Firewalls”, Elizabeth D. Zwicky, Simon Cooper, D.
Brent Chapman, 2nd Edition, Oreilly
• 4. “Practical Unix & Internet Security”, Simson Garfinkel, Gene Spafford,
Alan Schwartz, 3rd Edition, Oreilly
Introduction
• Why?

• What?

• How?
The Need for Security
• User id + password
• Not accessible for unauthorised
Data Transmission on the
Internet
• Data travels as clear text

• Personal or confidential information is not


secure

• Example: Credit card details


Security Management Practices
• Affordability

• Functionality

• Cultural issues

• Legality
Need for Security
• Why???
Principles of Security
• Confidentiality

• Integrity

• Authentication

• Non-repudiation
Transmission of Credit Card
Details
Customer Id: 78910
Order Id: 90
Clien Item Id: 156 Serve
t Credit Card Number: r
1234567890
Issued By: Visa
Valid Till: Jan 2006

Server
Database
Security approaches (Models)
• No security

• Security through obscurity

• Host security

• Network model
Confidentiality
• Also called as privacy

• Refers to the secrecy of information

• Only the sender and the receiver should


have an access to the information
N.B. Inception causes loss of message
confidentiality
Loss of Confidentiality

A Secret B

Sender Receiver
C

Attacker
Authentication
• Identifies the sender/receiver of a message

• Required so that the communicating parties


trust each other

• Answers who is who


• N.B. Fabrication is possible in the absence
of proper authentication
Absence of Authentication

I am user A
A B

Sender Receiver

C
Attacker
Integrity
• Ensures that any changes to a message are
detected

• The message from the sender to the receiver


must travel without any alterations

• Changes need to be prevented, or at least,


detected
• N.B. Modification causes loss of message
integrity
Loss of Message Integrity
Ideal route of the message

A B

Transfer $100
Transfer
to C
$1000
to C
Actual route of the message

C
Sender Attacker Receiver
Non-repudiation does not allow
the sender of a message to refuse
the claim of not sending the
message
Access Control
Who should be able to access what
1. Role Management – Which user can do
what?
2. Rule Management – Which resource is
accessible, and under what circumstances?
Availability
• Resources/applications must be available to
authentic users all the time

• Attackers can deny the availability

• Denial Of Service (DOS) is an example of


an attack on availability
Attack on Availability

A B

Sender Receiver
C

Attacker
Attacks A general view
• Criminal attacks
• Publicity attacks
• Legal attacks
Attack Technical view
• Interception –loss of confidentiality
• Fabrication: loss of authentication
• Modification- Loss of integrity
• Interruption-loss of avaiabilty
Types of Attacks

Attacks

Passive attacks Active attacks


Passive attacks
• Passive attacks do not involve any
modifications to the contents of an original
message
Classification of Passive Attacks

Passive attacks
(Interception)

Release of message Traffic analysis


contents
Active attacks
• The content of the original message are
modified in some way
Classification of Active Attacks

Active attacks

Interruption Modification Fabrication


(Masquerade) (Denial Of
Service - DOS)

Replay attacks Alterations


Practical Side of Attacks

Security attacks in
practice

Application level Network level attacks


attacks
Virus
• Program that causes damage to other
programs/applications/data

• Contains malicious code

• Propagates as it damages
Phases of virus
• Dormant
• Propagation
• Triggering
• Execution
Diff types of virus
• Parasitic
• Memory-resident
• Boot sector
• Polymorphic
• Metamorphic
Example of Virus

Add x to y Add x to y Delete all files


Perform Print-Job Perform Print-Job Send a copy of
Perform Close-Job Perform Virus-Job myself to all
End Perform Close-Job using this
End users address
book
Return

(a) Original (b) Virus (c) Virus code


clean code infected code
Worm
• Propagates as it damages

• Does not damage a program/data

• Consumes resources, and brings system to a


halt
Example of Worm
Perform resource-
Replicate eating tasks, but
itself no destruction

Replicate Perform resource- Perform resource-


itself eating tasks, but eating tasks, but
no destruction no destruction
Perform resource-
eating tasks, but Perform resource-
no destruction Perform resource-
eating tasks, but
eating tasks, but
no destruction
no destruction
Worm code
Perform resource-
eating tasks, but …
no destruction
Trojan Horse
• Why The name????
• Iliad - troy
• Silently observes user actions and captures
confidential information

• Uses captured information for its use

• Example: Capturing user id and password


Example of Trojan Horse
Login program

User User Id: xxx


Login code
Password: yyy

Trojan horse
Login code

User Id: xxx


Password: yyy

Attacker
Deleting virus

• Detection
• Identification
• Removal
Anti virus type
• 1st generation – simple scanners
• 2nd generations- Heuristic scanners
• 3rd generation- activity traps
• 4th generations-Full-featured protection
Specific attacks
• Sniffing and spoofing
• A. Packet sniffing
• B. Packet Spoofing
• The attacker can intercept reply
• The attacker needs not see intercept
reply
• The attacker does not want reply
Phishing & pharming

Potrebbero piacerti anche