1 Introduction
1 Introduction
Introduction
Kamalika Bhattacharjee
Assistant Professor
Dept of CSE, NIT Trichy
Cryptographic Algorithms and Protocols
● Symmetric encryption: Used to conceal the contents of blocks or streams of data
of any size, including messages, files, encryption keys, and passwords.
● Data integrity algorithms: Used to protect blocks of data, such as messages, from
alteration.
CIA triad
• Confidentiality
• Integrity
• Availability
Computer Security
● Confidentiality
○ Data confidentiality: Assures that private or confidential information is not made available or
disclosed to unauthorized individuals.
○ Privacy: Assures that individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be disclosed.
● Integrity
○ Data integrity: Assures that information (both stored and in transmitted packets) and programs are
changed only in a specified and authorized manner.
○ System integrity: Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system.
● Availability: Assures that systems work promptly and service is not denied to
authorized users.
Computer Security
● Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator. This means verifying that users are who they say they are and that each
input arriving at the system came from a trusted source.
● Accountability: The security goal that generates the requirement for actions of an
entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence,
fault isolation, intrusion detection and prevention, and after-action recovery and
legal action.
➢ Truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a
responsible party.
➢ Systems must keep records of their activities to permit later forensic analysis to trace security
breaches or to aid in transaction disputes.
Security Objectives
● Security attack: Any action that compromises the security of information owned
by an organization.
● Security mechanism: A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
● Security service: A processing or communication service that enhances the
security of the data processing systems and the information transfers of an
organization.
➢ The services are intended to counter security attacks, and they make use of one or
more security mechanisms to provide the service.
Threat and Attack
● Attack: An assault on system security that derives from an intelligent threat; that
is, an intelligent act that is a deliberate attempt (especially in the sense of a
method or technique) to evade security services and violate the security policy of a
system.
Threat and Attack
Passive Attacks
● Nature of eavesdropping on, or monitoring of, transmissions.
● The goal of the opponent is to obtain information that is being transmitted
● Release of message contents. We would like to prevent an opponent from learning the contents
of these transmissions.
● Traffic analysis: An opponent might still be able to observe the pattern of encrypted messages.
○ Can determine location and identity of communicating hosts and observe the frequency and length of messages
being exchanged.
○ useful in guessing the nature of the communication taking place
● The assurance that the communicating entity is the one that it claims to be.
● Peer Entity Authentication: Provides for the corroboration of the identity of a
peer entity in an association.
○ Two entities are considered peers if they implement to same protocol in different systems; used in
association with a logical connection to provide confidence in the identity of the entities connected.
● Data-Origin Authentication: Provides for the corroboration of the source of a
data unit. In a connectionless transfer, provides assurance that the source of
received data is as claimed.
○ Supports applications like electronic mail, where there are no prior interactions between the
communicating entities.
Access Control
● It is the ability to limit and control the access to host systems and applications via
communications links.
● To achieve this, each entity trying to gain access must first be identified, or
authenticated, so that access rights can be tailored to the individual.
Data Confidentiality
[Ref: X.800]
Fundamental Security Design Principles
● Economy of mechanism as simple and small as possible → easier to test and verify thoroughly
● Fail-safe defaults access decisions should be based on permission rather than exclusion
● Complete mediation every access must be checked against access control mechanism
● Open design security mechanism should be open to public scrutiny rather than secret
● Separation of privilege Multiple privilege attributes are required to achieve access to a restricted resource
● Least privilege every process/user of the system should operate using the least set of privileges
necessary to perform the task → role based access control
● Least common mechanism minimize the functions shared by different users → mutual security
● Psychological acceptability security mechanisms should be transparent to users or at most introduce
minimal obstruction.
Fundamental Security Design Principles
● Isolation
○ public access systems should be isolated from critical resources (data, processes, etc.) to
prevent disclosure or tampering → Physical and logical isolation
○ Processes & files of individual users should be isolated from one another except explicitly
desired
○ security mechanisms should be isolated in the sense of preventing access to those mechanisms
● Encapsulation
○ isolation based on object oriented functionality
● Modularity
○ development of security functions as separate, protected modules → Cryptographic module
○ modular architecture for mechanism design and implementation → scalable & upgradable
● Layering: defense in depth multiple, overlapping protection approaches
● Least astonishment a program or user interface should always respond in the way that is
least likely to astonish the user
Attack Surfaces
Reachable and exploitable vulnerabilities in a system
• Use of layering, or defense in depth, and attack surface reduction complement each other in
mitigating security risk
Attack Tree
● A branching, hierarchical data structure representing a set of potential techniques
for exploiting security vulnerabilities.
● The motivation for the use of attack trees is to effectively exploit the information
available on attack patterns
Attack Tree Example
● User terminal and user (UT/U):
attacks target the user equipment,
including the tokens that may be
involved, such as smartcards or other
password generators, as well as
actions of user
3. Develop methods for the distribution and sharing of the secret information.
4. Specify a protocol to be used by the two principals that makes use of the security
algorithm and the secret information to achieve a particular security service.
Network Access Security Model
● Hackers
● Information access threats: Intercept or modify data on behalf of users who should
not have access to that data.
● Service threats: Exploit service flaws in computers to inhibit use by legitimate users.