Chapter 7
Chapter 7
(TIT 1101)
What is network security?
3. Surveillance 9. Firewalls
4. Passwords/authentication 10. Encryption and Decryption
5. Auditing Techniques
6. Access rights 11. Digital Signature
7. Standard System attacks
12. Security Policy
3
External Security
4
Operational Security
time.
5
Surveillance
vandalism.
Trust
8
Passwords and ID Systems - Authentication?
9
Auditing
Creating a computer or paper audit can help detect wrongdoing.
based audits.
10
Access Rights
Two basic questions to access right: who and how?
14
A key is a number (or a set of numbers) that the cipher, as an
algorithm, operates on.
To encrypt a message, we need an encryption algorithm, an
encryption key, and the plaintext. These create the ciphertext.
To decrypt a message, we need a decryption algorithm, a
decryption key, and the ciphertext. These reveal the original
plaintext.
We can divide all the cryptography algorithms (ciphers) into
two groups: symmetric-key (also called secret-key)
cryptography algorithms and asymmetric (also called public-
key) cryptography algorithms.
15
Symmetric-Key Cryptography
encrypt data; the receiver uses the same key and the
16
Asymmetric-Key Cryptography
In asymmetric or public-key cryptography, there are two keys: a private
key and a public key. The private key is kept by the receiver. The public
key is announced to the public.
In public-key encryption/decryption, the public key that is used for
encryption is different from the private key that is used for decryption.
The public key is available to the public; the private key is available
only to an individual.
17
Keys used in cryptography
18
SYMMETRIC-KEY CRYPTOGRAPHY
Symmetric-key cryptography started thousands of years ago when
security.
19
A substitution cipher replaces one symbol with another.
Example:
Solution
The cipher is probably monoalphabetic because both
occurrences of L’s are encrypted as O’s.
20
Example 2
The following shows a plaintext and its corresponding
ciphertext. Is the cipher monoalphabetic?
Solution
The cipher is not monoalphabetic because each
occurrence of L is encrypted by a different character. The
first L is encrypted as N; the second as Z.
21
The shift cipher is sometimes referred to as the Caesar cipher.
In this cipher, the encryption algorithm is "shift key
characters down," with key equal to some number. The
decryption algorithm is "shift key characters up.“
Example:
Solution
We encrypt one character at a time. Each character is shifted 15
characters down. Letter H is encrypted to W. Letter E is encrypted to
T. The first L is encrypted to A. The second L is also encrypted to A.
And O is encrypted to D. The cipher text is WTAAD.
22
Example 2
Use the shift cipher with key = 15 to decrypt the message
“WTAAD.”
Solution
We decrypt one character at a time. Each character is
shifted 15 characters up. Letter W is decrypted to H. Letter
T is decrypted to E. The first A is decrypted to L. The
second A is decrypted to L. And, finally, D is decrypted to
O. The plaintext is HELLO.
23
A transposition cipher reorders (permutes) symbols in a
block of symbols.
24
Example
Encrypt the message “HELLO MY DEAR,” using the key
shown in Figure above
Solution
We first remove the spaces in the message. We then divide
the text into blocks of four characters. We add a bogus
character Z at the end of the third block. The result is
HELL OMYD EARZ. We create a three-block ciphertext
ELHLMDOYAZER.
25
Data Encryption Standard (DES)
One example of a complex block cipher is the Data Encryption Standard
(DES). DES was designed by IBM and adopted by the U.S. government
as the standard encryption method for nonmilitary and nonclassified use.
The algorithm encrypts a 64-bit plaintext block using a 64-bit key
26
ASYMMETRIC-KEY CRYPTOGRAPHY
An asymmetric-key (or public-key) cipher uses two keys: one
private and one public.
Example: RSA (Rivest, Shamir, and Adleman )
27
Selecting Keys
Bob use the following steps to select the private and public keys:
1. Bob chooses two very large prime numbers p and q. Remember that a
prime number is one that can be divided evenly only by 1 and itself.
2. Bob multiplies the above two primes to find n, the modulus for
29
Digital Signatures
A digital signature is much like a hand signature in that it provides
proof that you are the originator of the message (Authentication);
assigns a code to a document.
Used to bound the message originator with the exact contents of the
message through the use of key pairs. This allows for the feature of
non-repudiation (non-rejection) to be achieved - this is crucial for
electronic commerce.
Non-repudiation is a property achieved through cryptographic
methods which prevents an individual or entity from denying having
performed a particular action related to data.
The private key of the sender is used to compute a message digest.
32
A firewall as it stops certain internet and external transactions
33
Types of Firewall
A packet filter firewall is essentially a router that has been
programmed to filter out or allow to pass certain IP addresses or
TCP port numbers.
machines on network.
can be imposed.
Internet link, what about restricting access through all other entry
ways?
36
10 Tips for Computer Network Security