Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Lecture-1
1
Dangers of 2006 and beyond
Spyware
• also called adware or malware
• Distributed through IE and Windows
• Softwares like KaZaa and Bonzi buddy act as spyware
• Advertisement bombardment
• People with Mozilla Firefox(cross platform web browser) are safe
• Transferred by Trojan horse method or scripts.
Identity Theft
•Phishing
•Spamming
•Stealing personal information
•VAULT concept in Zone alarm Firewall prevents Identity theft.
Website attacks
•Stealing information from other sources not just banks. 2
•Trojan Horse method.
Course Outline
I. CRYPTOGRAPHY
Secret-key cryptography
Classical encryption techniques
DES, AES
Public-key cryptography
RSA
Key management
3
Course Outline (Continued)
II. AUTHENTICATION
MAC
Hashes and message digests
Digital signatures
Kerberos
4
Course Outline (Continued)
III Network security
IP security
transactions)
Firewalls
VPNs
Wireless security
5
Course Outline (Continued)
IV Other Issues
Viruses
Trojan Horses
Network attacks
Securing networks
6
Teaching materials
Reference Books
Network Security (A Hacker’s Perspective)
by William Stallings
Cryptography by Schnider
C.Kaufman, R.Perlamn,
data
Businessman: to discover a competitor’s strategic
marketing plan
Ex-employee: to get revenge for being fired
email
Convict: to steal credit card numbers for sale
11
Important Points
Making a network or a communication
secure involves more than just keeping it
free of programming errors
12
Security issues: some practical
situations
A sends a file to B: E intercepts it and reads it
How to send a file that looks gibberish to all but
the intended receiver?
14
Classes of Network Security
Problems
16
Basic situation in cryptography
B also has a key (say, the same key) and decrypts the cryptotext
to get the plaintext. This operation must be computationally easy
E tries to cryptanalyze: deduce the plaintext (and the key)
knowing only the cryptotext. This operation should be
computationally difficult
We will use cryptography to cover both the design of secure
systems and their cryptanalysis– cryptology is also used
sometimes
17
Cryptography-Some type of
Systems
Depending on the type of operations in
the encryption/decryption.
Substitutions (replacements) or
transpositions (rearrangement).
Number of keys used.
18
Cryptanalysis (Some types of
attacks)
Fundamental rule: one must always assume that the attacker
knows the methods for encryption and decryption; he is only looking
for the keys.
• Difficult to keep the cryptography algorithm secret (too many people
involved).
• Bonus of advertising. (People try to break it for you).
Passive attack: the attacker only monitors the traffic attacking the
confidentiality of the data.
19
Brute forcing
20
Attacks on protocols
Known-key attack: obtain some previous keys
and use the information to get the new ones
Replay: the adversary records a communication
of a legitimate user
Dictionary: the attacker has a list of probable
Computationally secure
25
I.1 Secret Key cryptography
I.1 Secret-key cryptography
Also called symmetric or conventional
cryptography
Five ingredients
Plaintext
Encryption algorithm: runs on the plaintext and the
encryption key to yield the ciphertext
Secret key: an input to the encryption algorithm, value
independent of the plaintext; different keys will yield different
outputs
Ciphertext: the scrambled text produced as an output by
the encryption algorithm
Decryption algorithm: runs on the ciphertext and the key
to produce the plaintext 26
Secret Key cryptography
(Contd)
• Requirements for secure conventional encryption
Strong encryption algorithm
• An opponent who knows one or more
ciphertexts would not be able to find the
plaintexts or the key
• Ideally, even if he knows one or more pairs
plaintext-ciphertext, he would not be able to
find the key
• Sender and receiver must share the same key.
Once the key is compromised, all communications
using that key are readable
• Encryption algorithm is not a secret
27
Cryptography notations
28
CAESER Cipher
It is a typical substitution cipher and the oldest known –
attributed to Julius Caesar
Simple rule: replace each letter of the alphabet with the
letterstanding 3 places further down the alphabet
Example:
30
Attacking CAESER Cipher
31
Attack results
Why?
32
Attack results
Plain: a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Hill Cipher
50
Hill Cipher
Takes two or three or more letter
combinations to the same size
combinations, e.g. “the” “rqv”
Uses simple linear equations
An example of a “block” cipher
encrypting a block of text at a time
Numbered alphabet: a = 0, b = 1, c =
3, etc.
(in CAP, use ASCII code) 51
Example
C1 = 9*p1 + 18*p2 + 10*p3 (mod 26)
C2 = 16*p1 + 21*p2 + 1*p3 (mod 26)
C3 = 5*p1 + 12*p2 + 23*p3 (mod 26)
C1 9 18 10 p1
C2 = 16 21 1 p2 (mod 26)
C3 5 12 23 p3
52
I can’t do it
EOM TMY SVJ
8 2 0 13 19 3 14 8 19
4 9 18 10 8
14 = 16 21 1 2 (mod 26)
12 5 12 23 0
19 9 18 10 13
12 = 16 21 1 19 (mod 26)
14 5 12 23 3
18 9 18 10 14
21 = 16 21 1 8 (mod 26)
9 5 12 23 19
53
Hill – key is matrix
k11 k12 k13
k21 k22 k23
k31 k32 k33
54
Hill – Important Observation
Friday ?
a b c d e f g h I j k l m n o p q r s t u v w
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
x y z
23 24 25
55