Lecture 2
Lecture 2
LECTURE 2
Security Services
1. Data Confidentiality
Data confidentiality is designed to protect data from disclosure attack
and also protection against traffic analysis.
2. Data Integrity
Data integrity is designed to protect data from modification, insertion,
deletion, and replaying by an adversary. It may protect the whole
message or part of the message.
Security Services
3. Authentication
This service provides the authentication of the party at the other end of the line
(sender or receiver).
4. Nonrepudiation
Nonrepudiation service protects against repudiation by either the sender or the
receiver of the data. The sender of data can later prove that data were delivered to
the intended recipient.
5. Access Control
Access control provides protection against unauthorized access to data.
Security Mechanisms
Encipherment
Encipherment, hiding or covering data, can provide confidentiality , cryptography
and steganography are used for enciphering.
Data Integrity
The data integrity mechanism appends to the data a short check value that has been
created by a specific process from the data itself.
Digital Signature
A digital signature is a means by which the sender can electronically sign the data
and the receiver can electronically verify the signature.
Security Mechanisms
Authentication Exchange
In authentication exchange, two entities exchange some messages to prove their identity to
each other.
Traffic Padding
Traffic padding means inserting some bogus data into the data traffic to thwart the
adversary’s attempt to use the traffic analysis.
Routing Control
Routing control means selecting and continuously changing different available routes
between the sender and the receiver to prevent the opponent from eavesdropping on a
particular route.
Security Mechanisms
Notarization
Notarization means selecting a third trusted party to control the communication
between two entities. This can be done, for example, to prevent repudiation.
Access Control
Access control uses methods to prove that a user has access right to the data or
resources owned by a system. Examples of proofs are passwords and PINs.
Cryptography
• Steganography
In this method, people not only want to
protect the secrecy of an information by
concealing it, but they also want to make
sure any unauthorized person gets no
evidence that the information even exists
Cryptography
• Improved coding techniques such as Vigenere Coding
came into existence in the 15th century, which offered
moving letters in the message with a number of variable
places instead of moving them the same number of places.
The design of the new cryptographic techniques to test their security strengths.
It involves the study of cryptographic mechanism with the intention to break
them.
The type of
operations used for The number of keys The way in which the
transforming plaintext used plaintext is processed
to ciphertext
Symmetric, single-
key, secret-key,
Substitution Block cipher
conventional
encryption
Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption
Cryptosystems
The user needs to trust that the public key that he is using in communications
with a person really is the public key of that person and has not been spoofed by a
malicious third party.