Cyber Security Chapter 2
Cyber Security Chapter 2
Definition:
1. Encryption:
o Definition: The process of converting plaintext (readable
data) into ciphertext (unreadable data) using an algorithm
and a key.
o Types:
Symmetric Encryption: Uses the same key for both
encryption and decryption (e.g., AES, DES).
Asymmetric Encryption: Uses a pair of keys, a
public key for encryption and a private key for
decryption (e.g., RSA, ECC).
2. Key Management:
o Key Generation: Creating cryptographic keys using
secure algorithms.
o Key Distribution: Securely sharing keys between parties.
o Key Storage: Protecting keys from unauthorized access
and disclosure.
o Key Rotation: Regularly updating keys to limit the impact
of key compromise.
3. Access Control:
o Ensuring that only authorized users can access certain
data.
o Implemented through authentication and authorization
mechanisms.
4. Secure Communication Protocols:
o Protocols like SSL/TLS for secure internet
communication.
o VPNs (Virtual Private Networks) for secure remote access.
Objectives:
1. Cipher:
o An algorithm for performing encryption or decryption.
o Examples include block ciphers (encrypts fixed-size
blocks of data) and stream ciphers (encrypts data as a
stream).
2. Key:
o A piece of information that controls the operation of a
cryptographic algorithm.
o Key length and complexity are crucial for security.
3. Cryptographic Strength:
o The measure of how difficult it is to break a cryptographic
system.
o Dependent on factors like key length, algorithm strength,
and implementation.
4. Attack Vectors:
o Brute Force Attack: Trying all possible keys to decrypt
ciphertext.
o Cryptanalysis: Analyzing ciphertext to find patterns and
deduce the key or plaintext.
o Side-Channel Attacks: Exploiting physical leakages (e.g.,
power consumption, timing) during encryption or
decryption.
Real-World Applications:
Secure Communications: Protecting emails, instant messaging,
and video conferencing.
Data Protection: Encrypting files and databases to prevent
unauthorized access.
E-commerce: Ensuring secure transactions and protecting
sensitive customer information.
Government and Military: Safeguarding classified information
from adversaries.
Advanced Topics:
Definition:
Types of Authentication:
Authentication Protocols:
1. Password-Based Authentication:
o Process: User submits a password, which is compared
against a stored hash.
o Security Measures: Salting and hashing passwords to
protect against breaches.
2. Token-Based Authentication:
o Process: User logs in with a username and password and
receives a token, which is used for subsequent requests.
o Examples: JWT (JSON Web Tokens), OAuth tokens.
3. Certificate-Based Authentication:
o Process: Uses digital certificates to verify identity.
Certificates are issued by trusted Certificate Authorities
(CAs).
o Application: SSL/TLS for secure web communication.
4. Biometric Authentication:
o Process: Uses physical characteristics for verification.
o Examples: Smartphones with fingerprint or facial
recognition.
5. Knowledge-Based Authentication (KBA):
o Process: Users answer personal questions to verify
identity.
o Application: Often used as a backup method for account
recovery.
1. OAuth:
oDefinition: Open standard for access delegation,
commonly used for token-based authentication.
o Application: Allows third-party applications to access
user data without exposing passwords.
2. OpenID Connect:
o Definition: Identity layer built on top of OAuth 2.0 for
authentication.
o Application: Used for single sign-on (SSO) across
different services.
3. SAML (Security Assertion Markup Language):
o Definition: XML-based standard for exchanging
authentication and authorization data.
o Application: Facilitates SSO in enterprise environments.
4. Kerberos:
o Definition: Network authentication protocol designed to
provide strong authentication for client-server
applications.
o Application: Widely used in enterprise networks for
secure authentication.
Real-World Applications:
Advanced Topics:
Secret Sharing
Definition:
1. Threshold Scheme:
o A secret is divided into nnn parts (shares) and distributed
to nnn participants.
o The secret can be reconstructed only if at least kkk out of
the nnn shares are combined (where k≤nk \leq nk≤n). This
is called a (k,n)(k, n)(k,n)-threshold scheme.
2. Shamir’s Secret Sharing:
o Based on polynomial interpolation.
o Choose a random polynomial of degree k−1k-1k−1 such
that the constant term is the secret.
o Evaluate the polynomial at nnn different points to create
the shares.
o To reconstruct the secret, use kkk points (shares) to solve
the polynomial and find the constant term.
1. Secret Definition:
o Let SSS be the secret to be shared.
o Select a prime number ppp larger than SSS and all shares.
2. Polynomial Creation:
o Choose a random polynomial f(x)=a0+a1x+a2x2+…
+ak−1xk−1f(x) = a_0 + a_1x + a_2x^2 + \ldots + a_{k-
1}x^{k-1}f(x)=a0+a1x+a2x2+…+ak−1xk−1 over a finite
field GF(p)GF(p)GF(p), where a0=Sa_0 = Sa0=S.
3. Share Generation:
o Compute nnn shares by evaluating the polynomial at nnn
distinct, non-zero points: (x1,f(x1)),(x2,f(x2)),…,
(xn,f(xn))(x_1, f(x_1)), (x_2, f(x_2)), \ldots, (x_n, f(x_n))
(x1,f(x1)),(x2,f(x2)),…,(xn,f(xn)).
4. Secret Reconstruction:
o Collect at least kkk shares.
o Use Lagrange interpolation to reconstruct the polynomial
f(x)f(x)f(x).
o The secret SSS is the constant term a0a_0a0 of the
polynomial.
Example:
Applications:
1. Distributed Trust:
o Enhances security by distributing trust among multiple
parties.
o Prevents a single point of failure.
2. Key Management:
o Securely managing cryptographic keys in a way that no
single entity has full access to the key.
3. Secure Multi-Party Computation:
o Performing computations on data without revealing the
data itself.
4. Threshold Cryptography:
o Enabling cryptographic operations to be carried out
collectively by a group of parties.
Advantages:
Challenges:
Definition:
Optimistic Results:
Key Concepts
Applications
Conclusion
Key Concepts
1. One-Time Pad:
o Mechanism: Each bit of the plaintext is XORed with a
random bit from a key that is as long as the message itself.
o Security: Since the key is truly random and used only
once, the ciphertext provides no information about the
plaintext. However, practical use is limited due to the need
for key distribution and management.
2. Quantum Key Distribution (QKD):
o Mechanism: Uses the principles of quantum mechanics to
securely distribute a key between two parties. The most
well-known QKD protocol is BB84.
o Security: Any eavesdropping attempt on the quantum
channel introduces detectable disturbances, ensuring the
security of the key exchange process.
3. Shannon's Theory:
o Shannon’s Theorems: Claude Shannon established the
theoretical foundations of information-theoretic security,
proving that perfect secrecy is achievable only if the key is
as long as the message and used only once.
Conclusion