240 likes | 624 Views
Security Attacks: Active and Passive. Active. Masquerade (impersonation). Replay. Modification of message. Denial of service. Passive. Traffic analysis. Release of message contents. Interruption Interception Modification Fabrication. Anita. Betito.
E N D
Security Attacks: Active and Passive • Active • Masquerade (impersonation) • Replay • Modification of message • Denial of service • Passive • Traffic analysis • Release of message contents
Interruption Interception Modification Fabrication Anita Betito Classes of Security Attacks
Interruption Interception Modification Fabrication Anita Betito Classes of Security Attacks: Interruption • Availability
Interruption Interception Modification Fabrication Anita Betito Classes of Security Attacks: Interception • Confidentiality
Interruption Interception Modification Fabrication Anita Betito Classes of Security Attacks: modification • Integrity
Interruption Interception Modification Fabrication Anita Betito Classes of Security Attacks: fabrication • Authenticity
Confidentiality - protect info value Authentication - protect info origin (sender) Identification - ensure identity of users Integrity - protect info accuracy Non-repudiation - protect from deniability Access control - access to info/resources Availability - ensure info delivery Security Services
"Any sufficiently advanced technology is indistinguishable from magic.” Arthur C. Clarke. secure mail secure communications network authentication electronic voting electronic notary digital money (digital wallet) data distribution Some Practical Applications
Pretty Good Privacy was created by Philip R. Zimmermann. For that, he was the target of a three-year criminal investigation, because the US government held that US export restrictions for cryptographic software were violated when PGP spread all around the world following its 1991 publication as freeware. Despite of this government persecution, PGP nonetheless became the most widely used email encryption software in the world. PGP is a freeware. A copy of the software can be obtain at, PGP download site: http://web.mit.edu/network/pgp.html Secure Mail: PGP (Pretty Good Privacy)
Scenarios Security for real-time electronic links local area networks link encryption cellular (and ordinary) phones and faxes Goals message privacy sender and recipient authentication non-repudiation Tools key-agreement protocols secret-key cryptosystems public-key cryptosystems digital signatures certicates Secure Communications
Scenarios conditional access TV software distribution via CDROM information bulletin boards Goals broadcast operation (TV, CDROM) message privacy selective reception Tools secretkey cryptography publickey cryptography secure hardware Data Distribution
Scenarios general elections shareholders meetings secure distributed computation Goals anonymity fairness accountability Tools RSA-based mathematics blind signatures sender untraceability protocols Electronic Voting
Scenarios replacement for paper money more flexible than credit cards Goals anonymity untraceability fairness dividability transferability offline (from bank) operations universality Tools more RSAbased mathematics zeroknowledge protocols secure hardware tokens Digital Money (Digital Wallet)
Design of cryptographic algorithms Analysis of cryptographic algorithms Design of cryptographic protocols Hardware and software implementations Applications of cryptography Some Research Interests in Cryptography
Cryptography Schemes Sender Receiver Message Adversary Problem: How to have secure communication over an insecure channel?
using this model requires us to: design an algorithm for the security transformation generate the secret information used by the algorithm develop methods to distribute the secret information specify a protocol enabling the principals to use the transformation & secret info for a security service Solution A: Trusted Third Party
Solution B: Secret-key cryptography key: e or d Sender Receiver Ciphertext C := f(e; M) M := g(d; C) Adversary • Exchange the key over a secure channel • Functions f(e; -) and g(d; -) are inverses of one another • Encryption and decryption processes are symmetric
requires establishment of a secure channel for key exchange two parties cannot start communication if they never met Problems with secret-key cryptography:
requires establishment of a public-key directory in which everyone publishes their encryption keys two parties can start communication even they never met provides ability to sign digital data Alternative: Public-Key Cryptography