JANNETE (2)
JANNETE (2)
1
Cryptograp
hy
What is Cryptography?
Cryptography, or cryptology, is the study and practice of
techniques for secure communication in the presence of
adversaries. It involves constructing and analyzing
protocols to protect private messages from unauthorized
access, ensuring data confidentiality, integrity,
authentication, and non-repudiation. Modern cryptography
is rooted in mathematics, computer science, and electrical
engineering, with applications in ATM cards, computer
passwords, and electronic commerce.
What is Cryptography?
Historically, cryptography was synonymous with
encryption, where information was transformed
into unreadable text, only decipherable by intended
recipients. Today, cryptographic algorithms rely on
computational hardness assumptions, making them
difficult to break in practice. While some schemes,
like the one-time pad, are theoretically
unbreakable, they are less practical compared to
computationally secure methods, which must
constantly evolve to counter advancements in
What is Cryptography?
The widespread use of cryptography has led to legal
and ethical challenges, as it can be used for
espionage and sedition. Some governments classify
cryptography as a weapon and impose restrictions
on its use and export. In certain jurisdictions,
investigators have the legal authority to compel the
disclosure of encryption keys. Cryptography is also
crucial in digital rights management, helping to
protect copyrighted digital content from
infringement. As technology continues to advance,
cryptography remains essential in securing digital
Some
Terminologies: Alphabet Shift
Ciphers
Key
A secret value used to encrypt and decrypt data. Ideally, the
key should be known only to the sender and recipient.
Without a variable key, a cipher can be easily broken and
rendered ineffective.
Some
Terminologies:
Cryptosystem
Cryptography
The practice and application of cryptographic techniques to
secure communication, ensuring confidentiality, integrity,
and authentication of data.
Some
Terminologies:
Cryptology
Digital Rights
Management (DRM)
• Cryptography plays a key role in Digital Rights
Management (DRM), which controls the use of
copyrighted content. In 1998, the Digital Millennium
Copyright Act (DMCA) was signed into law in the
U.S., criminalizing cryptanalytic techniques that
could bypass DRM. Similar laws exist globally,
including the EU Copyright Directive and treaties
under the World Intellectual Property Organization
(WIPO).
Legal Issues
Digital Rights
Management (DRM)
• While enforcement of the DMCA has not been as
strict as initially feared, it remains controversial.
Researchers like Niels Ferguson avoided publishing
security research due to legal risks. Others, such as
Alan Cox and Edward Felten, faced DMCA-related
issues, while Dmitry Sklyarov was arrested for
developing DRM-circumventing software legal in his
home country. In 2007, leaked cryptographic keys for
Blu-ray and HD DVD led to widespread backlash,
Legal Issues
Forced Disclosure of
Encryption Keys
• In some countries, laws mandate individuals to hand
over encryption keys or passwords during criminal
investigations. The UK's Regulation of Investigatory
Powers Act allows police to compel suspects to
decrypt files, with non-compliance leading to
imprisonment (up to five years for national security
cases). Similar laws exist in Australia, Finland,
France, and India.
Legal Issues
Forced Disclosure of
Encryption Keys
• In the U.S. case United States v. Fricosu (2012), a
court ruled that a defendant must provide an
unencrypted hard drive, despite arguments from the
Electronic Frontier Foundation (EFF) that this violated
the Fifth Amendment.
• To counter forced disclosure, some cryptographic
software enables plausible deniability, making
encrypted data appear as random, unused data
4.2
Enterprise
Information
• Enterprise information security architecture (EISA) is a
part of enterprise architecture focusing on information
security throughout the enterprise. EISA is the
practice of applying a comprehensive and rigorous
method for describing a current and/or future
structure and behavior for an organization’s security
processes, information security systems, personnel
and organizational sub-units, so that they align with
the organization’s core goals and strategic direction.
Although often associated strictly with information
security technology, it relates more broadly to the
security practice of business optimization in that it
addresses business security architecture,
Enterprise information security architecture
is becoming a common practice within the
financial institutions around the globe. The
primary purpose of creating an enterprise
information security architecture is to ensure
that business strategy and IT security are
aligned.
Enterprise Information Security Architecture Topics
Positioning
Enterprise information security architecture was first
formally positioned by Gartner in their whitepaper
called “Incorporating Security into the Enterprise
Architecture Process”. Since this publication, security
architecture has moved from being a silo-based
architecture to an enterprise focused solution that
incorporates business, information and technology.
Security architectural change imperatives now include things
like:
Business roadmaps
Legislative and legal requirements
Technology roadmaps
Industry trends
Risk trends
Visionaries
Enterprise Information Security Architecture Topics
Goals
Goals
Ensure that all models and implementations can be traced
back to the business strategy, specific business
ss. requirements and key principles.
Provide abstraction so that complicating factors, such as
geography and technology religion, can be removed and
strategy.
reinstated at different levels of detail only when required.
Establish a common “language’’ for information security
within the organization
Enterprise Information Security Architecture Topics
Methodology
The practice of enterprise information security architecture
involves creating an architecture security framework that
defines “current,” “intermediate,” and “target” reference
architectures to guide organizational change. These
frameworks outline the organizations, roles, entities, and
relationships necessary for carrying out business processes.
They establish a structured taxonomy and ontology to
precisely identify business operations and provide detailed
insights into how these processes are executed and secured.
Enterprise Information Security Architecture Topics
Methodology
As a result, the framework produces a set of artifacts that
document, at varying levels of detail, the business’s
operational structure and the security controls required. With
these descriptions, decision-makers gain valuable insights to
determine where to allocate resources, adjust organizational
goals and processes, and implement policies and procedures
that support the organization’s core missions and business
functions.
A strong enterprise information security architecture
process helps to answer basic questions like:
1. Passive
• Network
Wiretapping
Port scanner
Idle scan
Types of attack include:
2. Active
• Denial-of-service attack
• DNS spoofing
• Man in the middle
• ARP poisoning
• VLAN hoping
• Smurf attack
• Buffer overflow
• Heap overflow
• Format string attack
Types of attack include:
2. Active
• SQL injection
• Phishing
• Cross-site scripting
• CSRF
• Cyber-attack
4.4
Digital Rights
Management
Digital rights management
Digital rights management (DRM) schemes are various
access control technologies that are used to restrict
usage of proprietary hardware and copyrighted works.
DRM technologies try to control the use, modification,
and distribution of copyrighted works (such as software
and multimedia content), as well as systems within
devices that enforce these.
DRM: Controversy and Criticism
Limited Install
Activations
Some computer games use DRM to limit the number
of systems they can be installed on, requiring
authentication with an online server. Most games
allow three to five installs, with some permitting
installation recovery after uninstallation.
Technologies – DRM and Computer
Games
Persistent Online
Authentication
It is a DRM method that requires an internet
connection to verify a game’s legitimacy before and
during gameplay. This ensures only authorized users
can access the game and prevents piracy.
Games
Persistent Online
Authentication
some games need an internet connection to verify
ownership before playing.
In 2008, Ubisoft removed DRM from Prince of Persia to see if
piracy would decrease. However, over 23,000 illegal
downloads happened in just 24 hours.
In 2010, Ubisoft brought back online authentication using
Uplay, requiring players to stay online while playing. Cracked
versions only accessed limited parts of the game.
Other companies like Blizzard also use this system, storing
key game logic on their servers to prevent hacking and
piracy.
Games
Persistent Online
Authentication
some games need an internet connection to verify
ownership before playing.
In 2008, Ubisoft removed DRM from Prince of Persia to see if
piracy would decrease. However, over 23,000 illegal
downloads happened in just 24 hours.
In 2010, Ubisoft brought back online authentication using
Uplay, requiring players to stay online while playing. Cracked
versions only accessed limited parts of the game.
Other companies like Blizzard also use this system, storing
key game logic on their servers to prevent hacking and
piracy.
Games
Persistent Online
Authentication
some games need an internet connection to verify
ownership before playing.
In 2008, Ubisoft removed DRM from Prince of Persia to see if
piracy would decrease. However, over 23,000 illegal
downloads happened in just 24 hours.
In 2010, Ubisoft brought back online authentication using
Uplay, requiring players to stay online while playing. Cracked
versions only accessed limited parts of the game.
Other companies like Blizzard also use this system, storing
key game logic on their servers to prevent hacking and
piracy.
Technologies – DRM and Computer
Games
Software Tampering
refers to built-in countermeasures that detect
unauthorized or pirated copies of a game and
deliberately alter gameplay to discourage piracy.
Terminology
Stallman suggests using "Digital Restrictions Management"
4
instead of "rights" to accurately reflect DRM's purpose. This
term has been widely adopted.
Alternatives
Creative Commons offers licensing options encouraging the
5
expansion of creative work without DRM. DRM use breaches the
Baseline Rights of Creative Commons licenses.
DRM-Free Works
2 Purpose-Built Hardware
Purpose-built hardware can be compromised, leading to pirate decryption.
3 Environmental Issues
DRM can accelerate hardware obsolescence, increasing electronic waste.
Relaxing DRM Can Be Beneficial
Some experts argue that reducing DRM restrictions can benefit digital
rights holders. Former Microsoft executive Jeff Raikes suggested that if
piracy happens, it's better for it to be within their ecosystem. Studies
show that DRM-free content can boost sales by increasing value for
legal buyers. Additionally, free distribution can help small creators gain
popularity, leading to higher revenues from merchandise, concerts, and
paid content.
Can Increase Infringement
While DRM aims to prevent piracy, some models suggest it can
actually increase infringement and reduce profits. Strict DRM
restrictions can frustrate legal buyers, making piracy a more attractive
option. In the gaming industry, some DRM systems require constant
internet access, limiting user convenience. However, research shows
that DRM is not always the main reason for piracy, as some heavily
protected games are not among the most pirated titles.
4.5
Copyright Infringement
Understanding Copyright
Infringement
Copyright infringement involves using
protected works without permission,
violating the rights of the copyright holder.
This includes reproducing, distributing,
displaying, or creating derivative works.
Copyright holders use legal and
technological measures to prevent and
penalize infringement. Disputes are
typically resolved through negotiation, a
notice and takedown process, or litigation.
Egregious cases may face criminal
prosecution.
The Terminology of Infringement:
Piracy and Theft
The terms "piracy" and "theft" are often associated with copyright
infringement. "Piracy" originally meant robbery at sea but has
been used for centuries to describe copyright violations. "Theft"
emphasizes the commercial harm to copyright holders. However,
copyright is intellectual property, distinct from laws covering
tangible property. The U.S. Supreme Court ruled in 1985 that
infringement does not easily equate with theft.
Piracy Theft
2 Unavailability
No legitimate sellers providing the product in the end-
user's country due to launch delays or geographical
restrictions.
3 Usefulness
Legitimate products come with DRM, region locks,
or annoying advertisements removed in
unauthorized versions.
4 Anonymity
Downloading works does not require identification,
unlike direct downloads from copyright owners.
Copyright Infringement in
Developing Countries
Civil Law
Violation of exclusive rights occurs when copyrighted
material is used without permission. Remedies include
injunctions, damages, and the destruction of
infringing products as required by TRIPs Article 50.
Some jurisdictions impose large statutory damages to
deter infringement.
Criminal Law
Severe cases of copyright infringement can lead to jail
time and fines, as stated in TRIPs Article 61. Laws like
ACTA and SOPA propose harsher penalties, including
felony charges for online piracy.
Noncommercial File Sharing
Downloading
Copyright law in some countries permits downloading copyright-protected
content for personal, noncommercial use. Examples include Canada and
EU member states like Poland, The Netherlands, and Spain.
Uploading
Some countries, like Canada and Germany, have limited the penalties for
non-commercial copyright infringement. Germany has passed a bill to limit
the fine for individuals accused of sharing music and movies to $200.
DMCA and Anti-circumvention
Laws
Title I of the U.S. DMCA & WIPO Copyright Act prevent
bypassing technological protections on copyrighted
works.Circumvention of software, passwords, or access devices
may result in legal action.Exemptions exist for malfunctioning
copy protections and ineffective website filters.
Circumvention of software, passwords, or access devices may
result in legal action.