0% found this document useful (0 votes)
84 views22 pages

Computer System Security: Lecture 01

This document contains notes from a lecture on computer security. It introduces topics that will be covered in the course like cryptography, malware, firewalls, and web security. It outlines the course structure including assignments, exams, and attendance policy. Cryptography concepts are defined such as encryption, decryption, cryptanalysis, and cryptographic attacks. Symmetric and asymmetric key encryption are also introduced.

Uploaded by

mostafaa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views22 pages

Computer System Security: Lecture 01

This document contains notes from a lecture on computer security. It introduces topics that will be covered in the course like cryptography, malware, firewalls, and web security. It outlines the course structure including assignments, exams, and attendance policy. Cryptography concepts are defined such as encryption, decryption, cryptanalysis, and cryptographic attacks. Symmetric and asymmetric key encryption are also introduced.

Uploaded by

mostafaa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

3/3/14

1
!
!"#$%&'( *+,&'# *'-%(.&+
13CSCl34P - SemesLer 2 - 2013/2014

LecLure 01
ur. Ahmad MosLafa
LecLurer, 8rlush unlverslLy LgypL (8uL)
ahmad.mosLafa[bue.edu.eg
/%&0.1'
! lnLroducuon
! AdmlnlsLrauve Work
! 1oplcs
! lnLro Lo SecurlLy

3/3/14
2
!"%(,' *&23
! lnsLrucLor:
! ur. Ahmad MosLafa
! Lmall: ahmad.mosLafa[bue.edu.eg
! 1A:
! Lng. Amlra Clayan
! Lmall: amlra.olayan[bue.edu.eg
! Lng. nada
! Cmce Pours:
! 18A
4''&.15 6.#'
! LecLures:
! Mondays:
! SloL 3: 11:00 - 12:00 pm
! SloL 4: 12:00 - 01:00 pm
! 8oom: C8 - C6
! Labs:
! Wednesdays:
! SloL 6 & 7: 02:00 pm - 04:00 pm
! 8oom: Lab - C4
3/3/14
3
78$'-&2&."1,
! ro[ecL:
! 40 of Lhe LoLal mark
! Coursework 8rlef avallable onllne
! llnal Lxam:
! 60 of Lhe LoLal mark
! Cne 2-hour wrluen unseen exam
! !"#$ #&'($ )'(*

9:2& ;.00 ;' <.,-%,,=
! CompuLer securlLy prlnclples
! CrypLography : SymmeLrlc-key encrypuon, ubllc-key
encrypuon, ulglLal SlgnaLures, Secure hash funcuons, key
cerucaLes, key managemenL
! Secure SockeLs Layer (SSL/1LS)
! Malware
! llrewalls
! Web SecurlLy
! Secure LlecLronlc 1ransacuon (SL1)
3/3/14
4
78$'-&2&."1,
Sooner or laLer, you wlll geL whaL you expecL"
- 1he law of human behavlor

www.[eremlah-2911.com
78$'-&2&."1,
! Auendance
! ro[ecL
! Work
! Labs
! laglarlsm
3/3/14
3
*'-%(.&+
! 1hree can keep a secreL, lf Lwo of Lhem are dead
lranklln
! 1he onllne Lruly secure sysLem ls one LhaL ls
powered o, casL ln a block of concreLe and sealed
ln a lead-llned room wlLh armed guards.
Cene Spaord
!
*'-%(.&+ !"1-'$&,
3/3/14
6
!"#$%&'( *'-%(.&+ />'(>.';
! 1he nlS1 CompuLer SecurlLy Pandbook denes Lhe Lerm
!"#$%&'( *'+%(,&- as:
1he proLecuon aorded Lo an auLomaLed lnformauon sysLem ln
order Lo aualn Lhe appllcable ob[ecuves of preservlng Lhe
,.&'/(,&-, 010,203,2,&- and +".45'.602,&- of lnformauon sysLem
resources"
lncludes hardware, soware, rmware, lnformauon/daLa, and
Lelecommunlcauons.
6:' !?@ 6(.2<
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
Data
and
services
Figure 1.1 The Security Requirements Triad
I
n
t
e
g
r
i
t
y
Availability
3/3/14
7
A'+ *'-%(.&+ !"1-'$&,
!".45'.602,&-
- preservlng
auLhorlzed
resLrlcuons on
lnformauon access
and dlsclosure.
- lncludlng means
for proLecung
personal prlvacy
and proprleLary
lnformauon
- guardlng agalnsL
lmproper
lnformauon
modlcauon or
desLrucuon,
- lncludlng ensurlng
lnformauon
nonrepudlauon
and auLhenuclLy
710,203,2,&-
- ensurlng umely
and rellable access
Lo and use of
lnformauon
8.&'/(,&-
ls Lhls all?
!"#$%&'( *'-%(.&+ !:200'15',
! compuLer securlLy ls noL as slmple as lL mlghL rsL appear Lo
Lhe novlce
! poLenual auacks on Lhe securlLy feaLures musL be consldered
! procedures used Lo provlde parucular servlces are oen
counLerlnLuluve
! physlcal and loglcal placemenL needs Lo be deLermlned
! muluple algorlLhms or proLocols may be lnvolved
3/3/14
8
!"#$%&'( *'-%(.&+ !:200'15',
! auackers only need Lo nd a 9,./2' weakness, Lhe developer
needs Lo nd 022 weaknesses
! users and sysLem managers Lend Lo noL see Lhe beneLs of
securlLy unul a fallure occurs
! securlLy requlres regular and consLanL monlLorlng
! ls oen an aerLhoughL Lo be lncorporaLed lnLo a sysLem aer
Lhe deslgn ls compleLe
! LhoughL of as an lmpedlmenL Lo emclenL and user-frlendly
operauon
!"#$%&'( *'-%(.&+ 6'(#.1"0"5+
! 751'(90(- (LhreaL agenL)
! An enuLy LhaL auacks, or ls a LhreaL Lo, a sysLem.
! 7:0+;
! An assaulL on sysLem securlLy LhaL derlves from an lnLelllgenL
LhreaL, a dellberaLe auempL Lo evade securlLy servlces and
vlolaLe securlLy pollcy of a sysLem.
! !"%.&'(#'09%('
! An acuon, devlce, procedure, or Lechnlque LhaL reduces a
LhreaL, a vulnerablllLy, or an auack by ellmlnaung or
prevenung lL, by mlnlmlzlng Lhe harm lL can cause, or by
dlscoverlng and reporung lL so LhaL correcuve acuon can be
Laken.
3/3/14
9
!"#$%&'( *'-%(.&+ 6'(#.1"0"5+
! <,9;
! An expecLauon of loss expressed as Lhe probablllLy LhaL a
parucular LhreaL wlll explolL a parucular vulnerablllLy wlLh a
parucular harmful resulL.
! *'+%(,&- ="2,+-
! A seL of rules and pracuces LhaL speclfy how a sysLem or org
provldes securlLy servlces Lo proLecL sensluve and crlucal sysLem
resources.
! *-9&'# <'9"%(+' >799'&?
! uaLa, a servlce provlded by a sysLem, a sysLem capablllLy, an
lLem of sysLem equlpmenL, a faclllLy LhaL houses sysLem
operauons and equlpmenL.
!"#$%&'( *'-%(.&+ 6'(#.1"0"5+
! @A('0&
! A poLenual for vlolauon of securlLy, whlch exlsLs
when Lhere ls a clrcumsLance, capablllLy, acuon, or
evenL LhaL could breach securlLy and cause harm.
! B%2.'(03,2,&-
! llaw or weakness ln a sysLem's deslgn,
lmplemenLauon, or operauon and managemenL
LhaL could be explolLed Lo vlolaLe Lhe sysLem's
securlLy pollcy.
CD
3/3/14
10
*'-%(.&+ !"1-'$&, 21< B'02&."1,:.$,
C%01'(2D.0.&.',E 6:('2&, 21< @&&2-F,
! vulnerablllues
! leaky (loss of condenuallLy)
! corrupLed (loss of lnLegrlLy)
! unavallable or very slow (loss of avallablllLy)
! LhreaLs
! capable of explolung vulnerablllues
! represenL poLenual securlLy harm
! auacks (LhreaLs carrled ouL)
! passlve or acuve auempL Lo alLer/aecL sysLem
resources
! lnslder or ouLslder
EF
3/3/14
11
6:('2& !"1,'G%'1-',
G.0%&A"(,H'5 5,9+2"9%(' ls a LhreaL Lo !"#$%&#'()*+,
! +,-'.(/0: 1hls can be dellberaLe or be Lhe resulL of a human,
hardware, or soware error
! 12$0/30-4'2: unauLhorlzed access Lo daLa
! 1250/0230: e.g., Lramc analysls or use of llmlLed access Lo geL
deLalled lnformauon
! 12$/(.6'2: unauLhorlzed access Lo sensluve daLa
EC
!
!(+$&"5(2$:+
3/3/14
12
I3J'+61'9
! Learn how crypLography works
! Learn how encrypuon sysLems are broken
! undersLand baslc clphers:
! .(&.4$(4'2 and $/#2.-'.64'2 codes
Coal of CrypLography
! Lnsure .&!/0*+, of communlcauon over lnsecure
medlum
! rlvacy (secrecy, condenuallLy)
! lnLegrlLy
! CommunlcaLe even wlLh posslblllLy of adversarles
3/3/14
13
Maln ComponenLs ln Sendlng Messages
sender receiver Medium
Intruder
Interrupt
Intercept
Modify
Fabricate
Availability
Confidentiality
Integrity
Approaches Lo Secure Communlcauon
! SLeganography
! Plde message exlsLence
! CrypLography
- Plde message meanlng
3/3/14
14
CrypLography
! SecreL wrlung
! ulsgulsed daLa cannoL be read, modled, or fabrlcaLed
easlly
! K.+(-$6". : encodlng (enclpher)
plalnLexL " clpher LexL
= <p1, p2, p3, .., pn> " C = <c1, c2, c3, .., cm>
C = L(c) (L = encrypuon rule)
! L'+(-$6". : decodlng (declpher)
Clpher LexL " plalnLexL
C = <c1, c2, c3, .., cm> " = <p1, p2, p3, .., pn>
= u(c) (u = decrypuon rule)
CrypLosysLem
! Pow does Lhls help us accompllsh our goals?
! rlvacy
! lnLegrlLy
3/3/14
13
Lncrypuon
Lncrypuon uecrypuon
plaintext
Crlglnal
plalnLexL clpherLexL
Keyless
Lncrypuon uecrypuon
plaintext
Crlglnal
plalnLexL clpherLexL
Symmetric key
Lncrypuon uecrypuon
plaintext
Crlglnal
plalnLexL clpherLexL
Asymmetric key
CrypLanalysls
! Pow Lo break an encrypuon!
! CrypLanalysL
! ueduce Lhe orlglnal meanlng of Lhe clpherLexL
! ueLermlne Lhe decrypuon algorlLhm LhaL maLches
Lhe encrypuon one used
8reakable Lncrypuon!


3/3/14
16
CrypLanalyuc Auacks
! rely on:
! naLure of Lhe algorlLhm
! plus some knowledge of Lhe
general characLerlsucs of Lhe
plalnLexL
! even some sample plalnLexL-
clpherLexL palrs
! explolLs Lhe characLerlsucs of Lhe
algorlLhm Lo auempL Lo deduce a
speclc plalnLexL or Lhe key belng
used
! lf successful all fuLure and pasL
messages encrypLed wlLh LhaL key
are compromlsed
8ruLe-lorce Auack
! Lry all posslble keys on some
clpherLexL unul an
lnLelllglble Lranslauon lnLo
plalnLexL ls obLalned
! on average half of all
posslble keys musL be Lrled
Lo achleve success
@&&2-F.15 *+##'&(.- 71-(+$&."1
@>'(25' 6.#' H"( 78:2%,&.>' *'2(-:
Key Size (bits)
Number of
Alternative Keys
Time Required at 1
Decryption/s
Time Required at
10
6
Decryptions/s
32 2
32
= 4.3 ! 10
9
2
31
s = 35.8 minutes 2.15 milliseconds
56 2
56
= 7.2 ! 10
16
2
55
s = 1142 years 10.01 hours
128 2
128
= 3.4 ! 10
38
2
127
s = 5.4 ! 10
24
years 5.4 ! 10
18
years
168 2
168
= 3.7 ! 10
50
2
167
s = 5.9 ! 10
36
years 5.9 ! 10
30
years
26 characters
(permutation)
26! = 4 ! 10
26
2 ! 10
26
s = 6.4 ! 10
12
years 6.4 ! 10
6
years

3/3/14
17
Lxerclse



wklv phvvd[h lv qrw wrr kdug wr euhdn
Clphers
! *%396&%6". !,$A'(9
! SubsuLuLe a characLer or a symbol for each characLer of
Lhe orlglnal message
! @(0.9$"9,6". !,$A'(9
! 1he order of leuers ls rearranged
! noLauon
! uL8CASL LAln1Lx1
! lowercase clpherLexL


3/3/14
18
1he Caesar Clpher -- SubsuLuuon
# C
l
= p
l
+ 3

A " d
8 " e
C " f
.
x " a
? " b
Z " c
CrypLanalysls of Lhe Caesar Clpher
! 18LA1? lMCSSl8LL " wuhdwb lpsrvvleoh
! 8reak ls preserved
! uouble leuers are preserved
! 8epeaLed leuers

3/3/14
19
CLher SubsuLuuons: ermuLauon
! AlphabeL ls scrambled, each plalnLexL leuer maps Lo a
unlque clpherLexL leuer
! 1"0 &2(34)&
1, 2, 3, 4, 3, 6, 7, 8, 9
p1 = 1, 3, 3, 7, 9, 8, 6, 4, 2
p1(1) = 1, p1(2) = 3, p1(3) = 3, p1(4) = 7, eLc.
! key can be used Lo conLrol Lhe permuLauon used Lo
SubsuLuuon Clpher Lxample
! ABCDEFGHIJKLMNOPQRSTUVWXYZ
! wordabcefghijklmnpqstuvxyz
! ABCDEFGHIJKLMNOPQRSTUVWXYZ
! profesinalbcdghjkmqtuvwxyz
3/3/14
20
CrypLanalysls of subsuLuuon clphers
! 8ruLe force auack
! 26! posslblllues
! Clues
! ShorL words,
! Words wlLh repeaLed pauerns,
! Common lnlual and nal leuers, .
! knowledge of language may slmpllfy lL
! Lngllsh L, 1, C, A occur far more Lhan !, C, x, Z
! ConLexL
CrypLanalysls
! Lxample:
wklv phvvdjh lv qrw wrr kdug wr euhdn


wrr --> see, &"", add, odd, "M...
wr --> Lo, of


8esL guess: w = T, r = O
3/3/14
21
CrypLanalysls
wklv phvvdjh lv qrw wrr kdug wr euhdn

wrr --> see, &"", add, odd, "M...
wr --> Lo, of
8esL guess: w = T, r = O
lv --> so, ls, ln, ...

T_SO very unllkely...
T_IS llkely
8esL guess: l = I, v = S
CrypLanalysls
wklv phvvdjh lv qrw wrr kdug wr euhdn

wrr --> see, &"", add, odd, "M...
wr --> Lo, of
8esL guess: w = T, r = O

lv --> so, ls, ln, ...
8esL guess: l = I, v = S
wklv phvvdjh lv qrw wrr kdug wr euhdn
T-IS --SS--- IS -OT TOO ---- TO -----
3/3/14
22
!.$:'(,
! Ceaser
! layfalr
! vlgenere
! ermuLauon
! SubsuLuuon

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy