comp 3271 chapter 13

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

In information security, what does integrity primarily ensure?

  • Information is accessible to authorized entities when needed.
  • Information is efficiently stored and retrieved.
  • Information is hidden from unauthorized access.
  • Information is protected from unauthorized modification. (correct)

Which of the following attacks primarily threatens the availability of information?

  • Denial of service (correct)
  • Traffic analysis
  • Snooping
  • Masquerading

Which technique focuses on concealing the existence of a message rather than its contents?

  • Encipherment
  • Steganography (correct)
  • Hashing
  • Cryptography

What is a key characteristic of symmetric-key ciphers?

<p>They use the same key for encryption and decryption. (D)</p> Signup and view all the answers

In cryptography, what is the function of a 'nonce' in challenge-response authentication?

<p>It is a random number used to prevent replay attacks. (A)</p> Signup and view all the answers

Which security goal is most directly achieved through the use of ciphers?

<p>Confidentiality (B)</p> Signup and view all the answers

What is the primary purpose of a message digest?

<p>To ensure the message remains unchanged. (D)</p> Signup and view all the answers

How does a digital signature differ from a message authentication code (MAC)?

<p>A digital signature uses private-public keys, while a MAC uses a secret key. (D)</p> Signup and view all the answers

What is the main function of a Key Distribution Center (KDC)?

<p>To manage and distribute symmetric keys. (A)</p> Signup and view all the answers

During key generation in RSA, what is the purpose of the modulus n?

<p>It is used for the modular arithmetic in encryption and decryption. (A)</p> Signup and view all the answers

Which of the following is a key objective of entity authentication?

<p>To verify the identity of a communicating party (B)</p> Signup and view all the answers

In network security, what primary role does a firewall serve?

<p>Controlling network access (B)</p> Signup and view all the answers

Which of the following is a characteristic of a packet-filter firewall?

<p>It filters packets based on network and transport layer headers. (C)</p> Signup and view all the answers

What is the purpose of the Internet Key Exchange (IKE) protocol?

<p>To establish secure associations in IPSec (A)</p> Signup and view all the answers

Which protocol primarily provides security at the transport layer?

<p>SSL/TLS (D)</p> Signup and view all the answers

What does a 'cipher suite' define in the context of SSL?

<p>The combination of algorithms for key exchange, hash, and encryption (A)</p> Signup and view all the answers

Which three security services can a digital signature directly provide?

<p>Message integrity, authentication, and non-repudiation. (A)</p> Signup and view all the answers

Which feature is unique to ESP (Encapsulating Security Payload) compared to AH (Authentication Header) in IPSec?

<p>Confidentiality (D)</p> Signup and view all the answers

What is the purpose of 'key rings' in Pretty Good Privacy (PGP)?

<p>To store and manage multiple public and private keys (A)</p> Signup and view all the answers

What is Virtual Private Network (VPN) primarily used for?

<p>Secure Communication over Internet (A)</p> Signup and view all the answers

In what mode does IPSec protect the entire IP packet, including the header?

<p>Tunnel mode (B)</p> Signup and view all the answers

What is the primary role of the Handshake Protocol in SSL/TLS?

<p>To negotiate cipher suites (B)</p> Signup and view all the answers

What is the purpose of the Change Cipher Spec protocol?

<p>It signifies that the cryptographic parameters are about to change (C)</p> Signup and view all the answers

Which of the following distinguishes S/MIME from PGP regarding certificate authorities?

<p>S/MIME depends on centralized certificate authorities while PGP uses a web of trust. (C)</p> Signup and view all the answers

Which statement best describes how Pretty Good Privacy (PGP) secures email?

<p>PGP provides secure emails through privacy, integrity, and authenticity. (C)</p> Signup and view all the answers

Refer to the topology used in PGP, what kind of entity is Luise?

<p>Untrusted (D)</p> Signup and view all the answers

An organization needs to ensure secure communication between its branches over the internet. Which technology would be the most appropriate to implement?

<p>A Virtual Private Network (VPN) (B)</p> Signup and view all the answers

In the context of information transmission, what is the best description for why steganography might be chosen over cryptography?

<p>Steganography attracts less attention than encryption. (B)</p> Signup and view all the answers

There is a shared key between Alice and Bob. Alice sends Bob an encrypted message and also generates a Message Authentication Code (MAC). What does the use of the MAC achieve?

<p>Provides integrity and data origin authentication. (A)</p> Signup and view all the answers

When is asymmetric-key cryptography more efficient than symmetric-key cryptography?

<p>Encrypting large messages (C)</p> Signup and view all the answers

What should be the ideal ideal for a 309-digit RSA exponent?

<p>65537 (C)</p> Signup and view all the answers

If Alice wants to send message to N people, how many keys are needed?

<p>N (B)</p> Signup and view all the answers

What are the 2 protocols defined by IPCsec to provide authentication and/or encryption for packets at the IP level?

<p>Authentication Header (AH) Protocol and the Encapsulating Security Payload (ESP) Protocol (D)</p> Signup and view all the answers

What does a Security Policy Database determine for packets?

<p>If there is SA for that type of traffic. (B)</p> Signup and view all the answers

Given the goals of security, Confidentiality, Integrity, and Availability, which goal applies to changes made by an authorized entity?

<p>Integrity (B)</p> Signup and view all the answers

In the context of cryptography, what is the significance of modulo 26?

<p>It is frequently used in ciphers that involve alphabetic characters. (A)</p> Signup and view all the answers

Under what conditions is the One-Time Pad (OTP) encryption method considered completely secure?

<p>If the OTP is truly random, never reused and the same length as the message (D)</p> Signup and view all the answers

What is the primary component used to preserve the integity of a document

<p>Fingerprint (C)</p> Signup and view all the answers

What is an advantage for using steganography instead of cryptography

<p>The message does not obviously exist (D)</p> Signup and view all the answers

What is correct asymmetric protocol?

<p>People do not need to know a symmetric shared key (C)</p> Signup and view all the answers

What is an advantage a symmetric-key algorithm has over an asymmetric-key algorithm

<p>More efficient than asymmetric-key algorithm for enciphering larger messages (A)</p> Signup and view all the answers

What has to be determined in order to figure out if the IPSec provides proper access control indirectly?

<p>If there is no Security Association already established for this packet (B)</p> Signup and view all the answers

With digital signatures, what aspect can directly provide the last three regarding several security services (message confidentiality, message authentication, message integrity, and non-repudiation)?

<p>Digital Signing (A)</p> Signup and view all the answers

What security services does the Authenticating Header (AH) provide in IPSec?

<p>Ensure Data Origin Authentication and Message Integrity. (D)</p> Signup and view all the answers

If 𝑁 number of members require communication with each other, how many keys are required when two people use two keys for bidirectional communication?

<p>𝑁(𝑁 - 1) (A)</p> Signup and view all the answers

Within IPSec, if confidentiality is needed for one should choose?

<p>ESP over AH (B)</p> Signup and view all the answers

Assuming the roles Alice and Bob are using the Diffie-Hellman key exchange, what conditions are required in order to implement?

<p>Values of p and g public (B)</p> Signup and view all the answers

Which of the following is an example of an attack that threatens confidentiality?

<p>Interception of network traffic containing sensitive data. (C)</p> Signup and view all the answers

In the context of security attacks, what does 'masquerading' primarily threaten?

<p>Integrity (D)</p> Signup and view all the answers

Which of the following best describes the purpose of steganography?

<p>To hide the existence of a message by embedding it within another medium. (B)</p> Signup and view all the answers

In a symmetric-key cipher, if Alice and Bob wish to communicate, what must they do?

<p>Establish a secure channel to exchange the secret key. (B)</p> Signup and view all the answers

In cryptography, what is the Caesar cipher an example of?

<p>A substitution cipher (B)</p> Signup and view all the answers

What is a primary characteristic of a transposition cipher?

<p>It rearranges the order of characters in the message. (B)</p> Signup and view all the answers

How do modern ciphers differ from traditional ciphers in terms of data handling?

<p>Traditional ciphers are character-oriented, while modern ciphers are bit-oriented. (B)</p> Signup and view all the answers

What is a fundamental difference between a block cipher and a stream cipher?

<p>Stream ciphers encrypt data bit-by-bit, while block ciphers encrypt data in fixed-size blocks. (D)</p> Signup and view all the answers

What is the purpose of the S-boxes in the DES (Data Encryption Standard) algorithm?

<p>To introduce non-linearity, which is crucial for security. (D)</p> Signup and view all the answers

Why is it important for the S-boxes in DES to be non-linear?

<p>To make the cipher more resistant to linear cryptanalysis. (A)</p> Signup and view all the answers

In the context of cryptography, what is the primary advantage of using asymmetric-key ciphers?

<p>Simplified key distribution, since only the public key needs to be transmitted. (D)</p> Signup and view all the answers

In RSA, what is the purpose of the public exponent e and the private exponent d?

<p><em>e</em> is used for encryption, while <em>d</em> is used for decryption. (C)</p> Signup and view all the answers

In RSA cryptography, which key is used to encrypt the plaintext message by the sender?

<p>The receiver's public key (B)</p> Signup and view all the answers

What is a message digest primarily used for?

<p>To ensure the integrity of a message. (B)</p> Signup and view all the answers

Which statement best describes the function of a cryptographic hash function?

<p>It converts a variable-length input into a fixed-size output. (C)</p> Signup and view all the answers

What is the main purpose of a Message Authentication Code (MAC)?

<p>To verify the integrity and authenticity of a message. (C)</p> Signup and view all the answers

How does a digital signature provide non-repudiation?

<p>By using the sender's private key, which only the sender should possess. (A)</p> Signup and view all the answers

In digital signatures, what key is used to create the signature?

<p>The sender's private key (A)</p> Signup and view all the answers

Which of the following best describes entity authentication?

<p>Confirming the identity of a sender or receiver in a communication. (A)</p> Signup and view all the answers

What is a 'nonce' primarily used for in authentication protocols?

<p>To prevent replay attacks. (D)</p> Signup and view all the answers

In what category of authentication does a password fall?

<p>Something known (D)</p> Signup and view all the answers

What is the main goal of key management in cryptography?

<p>To securely distribute and maintain cryptographic keys. (A)</p> Signup and view all the answers

What is the main challenge associated with symmetric-key distribution?

<p>Securely transmitting the secret key to all parties. (D)</p> Signup and view all the answers

What is the purpose of a Key Distribution Center (KDC)?

<p>To securely distribute secret keys between communicating parties. (C)</p> Signup and view all the answers

Which cryptographic scheme does Diffie-Hellman primarily address?

<p>Secure key exchange over an insecure channel (B)</p> Signup and view all the answers

In the context of IPSec, what does 'transport mode' primarily protect?

<p>The payload of the IP packet. (C)</p> Signup and view all the answers

Which of the following describes the main function of IPSec's tunnel mode?

<p>It encrypts the entire IP packet, including the header. (B)</p> Signup and view all the answers

What is the role of the Security Policy Database (SPD) in IPSec?

<p>To determine what security associations should be applied to packets. (C)</p> Signup and view all the answers

Which component is used by IKE?

<p>The SPD (B)</p> Signup and view all the answers

What is the main purpose of the Internet Key Exchange (IKE) protocol?

<p>To establish and manage Security Associations (SAs) in IPSec. (B)</p> Signup and view all the answers

At which layer of the OSI model does SSL/TLS primarily operate?

<p>Transport Layer (B)</p> Signup and view all the answers

When establishing an SSL/TLS connection, what parameters are negotiated to define how the connection will be secured?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of the SSL/TLS Handshake Protocol?

<p>To negotiate the cipher suite and establish cryptographic keys. (D)</p> Signup and view all the answers

Within SSL/TLS, what action triggers the use of new cryptographic parameters?

<p>The Change Cipher Spec message is sent. (B)</p> Signup and view all the answers

How is an email addressed to Bob encypted?

<p>Bob's public key (D)</p> Signup and view all the answers

How does PGP primarily certify keys?

<p>By relying on a web of trust (C)</p> Signup and view all the answers

In PGP, what is the main purpose of 'key rings'?

<p>To store a collection of public keys and private keys used by a user. (A)</p> Signup and view all the answers

What does Mime stand for?

<p>Multipurpose Internet Mail Extension (A)</p> Signup and view all the answers

What is a packet filter firewall primarily designed to do?

<p>Block or forward packets based on network and transport layer information. (B)</p> Signup and view all the answers

Proxy firewalls operate at which layer, compared to packet-filter?

<p>application (A)</p> Signup and view all the answers

What is the primary advantage of a proxy firewall over a packet-filter firewall?

<p>Ability to filter traffic based on application-layer content. (D)</p> Signup and view all the answers

What is a critical requirement for information to maintain its integrity?

<p>Changes should only be made by authorized entities through authorized mechanisms. (A)</p> Signup and view all the answers

Which of the following attacks directly targets the integrity of a message by falsely claiming it is from a different user?

<p>Masquerading (B)</p> Signup and view all the answers

What distinguishes steganography from cryptography as a security technique?

<p>Steganography hides the existence of the message; cryptography transforms its content. (C)</p> Signup and view all the answers

How does the use of symmetric-key ciphers affect communication security when only confidentiality is a concern?

<p>It necessitates a secure channel for exchanging the secret key. (C)</p> Signup and view all the answers

In the context of security, what is the purpose of 'Repudiation'?

<p>Ensuring authorized parties cannot deny sending a message. (D)</p> Signup and view all the answers

Consider Alice using RSA to send a confidential message to Bob. What key does Alice use to encrypt her message?

<p>Bob's public key. (A)</p> Signup and view all the answers

How do message digests contribute to data security, specifically in verifying the integrity of a transmitted file?

<p>By providing a one-way hash of the file, which can be used to detect alterations. (B)</p> Signup and view all the answers

Which of the following characteristics distinguishes a digital signature from a simple Message Authentication Code (MAC)?

<p>Digital signatures provide non-repudiation, while MACs do not. (D)</p> Signup and view all the answers

What is a primary challenge in symmetric-key distribution that Key Distribution Centers (KDCs) are designed to solve?

<p>Managing the large number of keys required in a fully connected network. (A)</p> Signup and view all the answers

How does the Diffie-Hellman key exchange protocol establish a shared secret key over an insecure channel?

<p>By exchanging public keys and performing a mathematical operation. (C)</p> Signup and view all the answers

In the context of network security, what is the main goal of implementing IPSec?

<p>To secure IP packets by providing confidentiality, integrity, and authentication at the network layer. (B)</p> Signup and view all the answers

Consider the use of IPSec in 'transport mode.' What part of the IP packet is typically protected?

<p>The payload (data) of the IP packet. (C)</p> Signup and view all the answers

What defines the behavior of an IPSec connection determining whether a packet is protected by IPSec, bypassed, or dropped?

<p>Security Policy Database (SPD). (A)</p> Signup and view all the answers

What is the primary function of the Internet Key Exchange (IKE) protocol in the context of IPSec?

<p>To manage and negotiate Security Associations (SAs) between hosts. (A)</p> Signup and view all the answers

Why is the 'Change Cipher Spec' protocol important in SSL/TLS?

<p>It signals that the negotiated cryptographic parameters should be used for subsequent records. (C)</p> Signup and view all the answers

In PGP, how are keys typically certified to establish a 'web of trust'?

<p>By having users digitally sign each other's keys, indicating trust. (C)</p> Signup and view all the answers

What is the main purpose of 'key rings' in PGP?

<p>Managing and storing public and private keys. (A)</p> Signup and view all the answers

What distinguishes S/MIME's approach to certificate validation from PGP's?

<p>S/MIME uses Certification Authorities, whereas PGP relies on a web of trust. (B)</p> Signup and view all the answers

What best describes the role of a proxy firewall in network security?

<p>It acts as an intermediary, interpreting and inspecting traffic at the application layer. (B)</p> Signup and view all the answers

What is a significant difference in how proxy firewalls operate compared to packet-filter firewalls?

<p>Proxy firewalls operate at a higher layer, inspecting the application data, while packet-filter firewalls operate at the network or transport layer. (C)</p> Signup and view all the answers

Flashcards

Confidentiality

Hiding information from unauthorized access.

Integrity

Protecting information from unauthorized changes.

Availability

Ensuring information is available to authorized entities when needed.

Security Attack

An attempt to breach security, confidentiality, integrity and availability.

Signup and view all the flashcards

Snooping

Illegally obtaining access to sensitive data.

Signup and view all the flashcards

Traffic Analysis

Interception and analysis of network traffic patterns.

Signup and view all the flashcards

Modification Attack

Unauthorized data alteration.

Signup and view all the flashcards

Masquerading Attack

Pretending to be someone else.

Signup and view all the flashcards

Replaying Attack

Capturing and resending data to produce an unauthorized effect.

Signup and view all the flashcards

Repudiation Attack

Denying a performed action.

Signup and view all the flashcards

Denial of Service (DoS)

Preventing legitimate users from accessing resources.

Signup and view all the flashcards

Security Services

Security measures designed to prevent attacks.

Signup and view all the flashcards

Cryptography

The art of transforming messages to secure them.

Signup and view all the flashcards

Steganography

Hiding the existence of a message.

Signup and view all the flashcards

Confidentiality

Achieved via ciphers divided into symmetric-key and asymmetric-key types.

Signup and view all the flashcards

Symmetric-Key Cipher

A cipher using the same key for encryption and decryption.

Signup and view all the flashcards

Substitution Cipher

Encryption using letter subsitution

Signup and view all the flashcards

Transposition Cipher

Encryption using position shifting

Signup and view all the flashcards

Block Cipher

A modern cipher that encrypts data block by block.

Signup and view all the flashcards

Stream Cipher

A modern cipher that encrypts data bit by bit.

Signup and view all the flashcards

Bit-Level Encryption

Each character is replaced by 8 (or 16) bits which increases security

Signup and view all the flashcards

Additive Cipher

A symmetric-key cipher where the key is added to plaintext modulo 26.

Signup and view all the flashcards

Monoalphabetic Subsitiution

a key from figure 13.5 is used

Signup and view all the flashcards

Autokey Cipher

A symmetric-key cipher where part of the plaintext is used in stream key.

Signup and view all the flashcards

Transposition cipher

A type of cipher that rearranges the order of letters.

Signup and view all the flashcards

One-time Pad

A plaintext is easy to read but the key must to kept secret

Signup and view all the flashcards

Asymmetric-Key Cipher

Uses different keys for encryption and decryption.

Signup and view all the flashcards

RSA Cryptosystem

A widely-used asymmetric encryption algorithm.

Signup and view all the flashcards

RSA Cryptosystem

A bank requires that money transactions must only be accessible by specific accounts.

Signup and view all the flashcards

Message Integrity

Guarantees data remains unchanged.

Signup and view all the flashcards

Message Digest

Document fingerprinting preserving document integrity.

Signup and view all the flashcards

Cryptographic Hash Function

Takes a message of certain length and creates a message of certain size.

Signup and view all the flashcards

Message Authentication

Ensure the source and the integrity of a message.

Signup and view all the flashcards

HMAC (Hashed MAC)

Standard for Nested MAC which is a hashed MAC.

Signup and view all the flashcards

Digital Signature

Pair of private- public keys used to sign a MAC to protect message.

Signup and view all the flashcards

Comparaison

It is the opposite of conventional signatures and digital signatures.

Signup and view all the flashcards

Process

Sender signs messages.

Signup and view all the flashcards

Services

It includes confidentiality message authentication.

Signup and view all the flashcards

Digital Signatures

Using a trusted center and has secure messages.

Signup and view all the flashcards

RSA Digital Signature

In this Scheme the roles of the private and public keys are switched.

Signup and view all the flashcards

DSS

Digital Signature Standard.

Signup and view all the flashcards

Entity Authentication

Technique designed to let one party verify the identity of another party.

Signup and view all the flashcards

Message authentication

Might not happen in real time but entity authentication

Signup and view all the flashcards

Verification Categories

Claimant must identify itself to the verifier.

Signup and view all the flashcards

Passwords

simpliest and oldest method of authentication.

Signup and view all the flashcards

Challenge-Response

Proves a secret without sending it to verifier.

Signup and view all the flashcards

Key Management

Distribution of symmetric and asymmetric keys.

Signup and view all the flashcards

Symmetric-Key Distribution

Needs shared secret key between 2 parties.

Signup and view all the flashcards

Exchange Confidential Messages

Needed confidentiality with N people.

Signup and view all the flashcards

International KDC

Has connections with National KD c's.

Signup and view all the flashcards

Symmetric-Key Agreement

Can create a session key between themselves.

Signup and view all the flashcards

Public-Key distribution

Know the Public keys.

Signup and view all the flashcards

Network-Layer Security

At the network layer, security is applied between 2 host and routers.

Signup and view all the flashcards

Transport Mode

IPSec protects what is delivered from the transport.

Signup and view all the flashcards

Host B

Has virtual communication .

Signup and view all the flashcards

Tunnel Mode

IPSec protects the entire IP packet.

Signup and view all the flashcards

Tunnel Mode

Protects virtual communication.

Signup and view all the flashcards

Services provided by IPSec

AH and ESP.

Signup and view all the flashcards

Security Association Database

Can be discarded and is used to get access control

Signup and view all the flashcards

The Internet Key Exchange

Created inbound and outbound Security Associations.

Signup and view all the flashcards

Virtual Private Network

Gaining popularity among organizations that use the global Internet.

Signup and view all the flashcards

Transport-Layer Security

Protects the application with connection oriented protocol.

Signup and view all the flashcards

SSL Architecture

Provides security compression services to data.

Signup and view all the flashcards

Payload

Services for SSL.

Signup and view all the flashcards

Key Exchange Algorithms

Clients and servers need to share a key.

Signup and view all the flashcards

Hash Algorithms

Sll uses hash for message integrity.

Signup and view all the flashcards

Cipher Suite

Key exchange, hash, and encryption algoritm

Signup and view all the flashcards

Compression Algorithm

Optional in SLL; no specific compression algorithm is made.

Signup and view all the flashcards

Cryptographic Parameter Generation

Sll requires 6 cryptographic Secrets.

Signup and view all the flashcards

Session

The association beetween a clients and a server.

Signup and view all the flashcards

Protocols

Sll shows four processes.

Signup and view all the flashcards

Handshake Protocol

Uses messages to negotiate the cipher suite.

Signup and view all the flashcards

Change cipher spec

Can use specific protocles

Signup and view all the flashcards

Alert Protocols

Uses a singular mssage and is fatal.

Signup and view all the flashcards

Record Protocol

Helps move messages from layer.

Signup and view all the flashcards

13.6 APllICATION-LAYER SECURITY

The process by which this is to be done

Signup and view all the flashcards

E-mail Security

Security protocols for e-mail

Signup and view all the flashcards

Cryptographic Algorithms

how can the sender and receiver agree on a cryptographic algorithm to use for e-mail security

Signup and view all the flashcards

E- mail security

If there is no one to negotiate.

Signup and view all the flashcards

Certificates

It obvious because it has to be

Signup and view all the flashcards

PGP (Pretty Good Privacy)

Email which provides security and authentication.

Signup and view all the flashcards

Scenarios

Term that shows what message

Signup and view all the flashcards

Key Rings

Pgp helps you.

Signup and view all the flashcards

PgP AlgorithmS

PgP defines a set of algorithms.

Signup and view all the flashcards

PgP Certificate

Other protocols use certificates .

Signup and view all the flashcards

PGP Packet

Message can consistsis of one or more pakerts.

Signup and view all the flashcards

Applications of Pgp

Used for pesronal emails

Signup and view all the flashcards

Service Email System

Provides security for e- mail

Signup and view all the flashcards

Cryptographic Message Syntac

adds to MIME content to define security

Signup and view all the flashcards

Segmenatation

Allows fragmentation of msg before transmission via Radix

Signup and view all the flashcards

Firewall

designed to forward some packets and filter others.

Signup and view all the flashcards

Packet Filter

Can be used as packet fillter.

Signup and view all the flashcards

The packet and system

Has messages available

Signup and view all the flashcards

Study Notes

Introduction to Computer Network Security

  • Information is a valuable asset requiring security measures to protect against attacks.
  • Securing information involves confidentiality, integrity, and availability.
    • Confidentiality: Hiding information from unauthorized access.
    • Integrity: Protecting information from unauthorized modification.
    • Availability: Ensuring information is accessible to authorized entities when needed.

Security Goals

  • Confidentiality, integrity, and availability are key security goals.

Security Ataacks

  • Security attacks threaten confidentiality through snooping and traffic analysis.
  • Data integrity is threatened by modification, masquerading, replaying, and repudiation attacks.
  • Availability is threatened by denial-of-service attacks.

Secuity Services and Techniques

  • ITU-T defines security services for achieving security goals and preventing attacks.
  • Implementing security involves techniques like cryptography and steganography.
    • Cryptography is a general technique involving symmetric-key encipherment, asymmetric-key encipherment, and hashing.
    • Steganography is a specific technique that focuses on covered writing, different from cryptography's "secret writing".

Confidentiality and Ciphers

  • Confidentiality is achieved using ciphers divided into symmetric-key and asymmetric-key categories.

Symmetric-Key Ciphers

  • A symmetric-key cipher uses the same key for encryption and decryption, enabling bidirectional communication.
  • Traditional ciphers include substitution and transposition ciphers.

Modern Symmetric-Key Ciphers

  • Modern symmetric-key ciphers are bit-oriented and can be block or stream ciphers.
  • They address the need to encrypt numbers, graphics, audio, and video data, not just text.
  • Using 8 or 16 bits per character increases the number of symbols and security.

Asymmetric-Key Ciphers

  • Asymmetric-key ciphers complement symmetric-key, offering advantages that compensate for each other's disadvantages.

RSA Cryptosystem

  • The RSA cryptosystem, named after Rivest, Shamir, and Adleman, is a common public-key algorithm.
  • RSA uses two exponents, e (public) and d (private).
  • Alice creates ciphertext C from plaintext P using: C = Pe mod n.
  • Bob retrieves P using: P = Cd mod n.
  • Modulus n, a large number, is created during key generation.

Other Aspects of Security

  • Modern communication requires considering integrity, message/entity authentication, nonrepudiation, and key management in addition to confidentiality.

Message Integrity

  • Message integrity ensures that a message remains unchanged.

Message and Message Digest

  • Message integrity can be preserved using a fingerprint.
  • A message digest is similar to a fingerprint, which can be compared to ensure it is the same.

Hash Functions

  • Cryptographic hash functions produce a fixed-length message digest from a message of arbitrary length.
  • Iteration is used, incorporating a fixed-size input function (compression function).

Message Authentication

  • Including a secret shared between Alice and Bob that Eve doesn't possess during the process; we need to create a message authentication code (MAC).

Digital Signature vs HMAC

  • A MAC uses a secret key to protect the digest, while a digital signature uses a pair of private-public keys.

Digital Signatures

  • With digital signatures, the sender uses a signing algorithm; the receiver verifies using a verifying algorithm.

Security Services Through Digital Signatures

  • Digital signatures provide message authentication, message integrity, and non-repudiation.
  • Confidentiality still requires encryption/decryption.

RSA for Digital Signatures

  • RSA can also be used for signing and verifying a message and is known as the RSA digital signature scheme.
  • Only the sender's private and public keys are used, unlike during RSA encryption.

Entity Authentication

  • Entity authentication is a technique where one party verifies the identity of another.
  • The entity to be proven is the claimant; the verifying party is the verifier.

Types of Authetication

  • The claimant must identify via something known, possessed, or inherent.

Passwords

  • Password is the oldest method of entity authentication that is considered prone to attack.

Challenge-Response Authentication

  • Challenge-response authentication involves proving knowledge of a secret without sending it. The verifier either possesses or retrieves the secret.

Key Management

  • Secret keys must be handled and distributed with appropriate care.
  • Public keys in asymmetric-key cryptography need to be handled in a similar fashion.

Symmetric-Key Distribution

  • Symmetric-key cryptography requires a shared secret key between two parties and is more efficient than asymmetric-key methods for large messages.
  • Exchanging confidential messages with N people requires N distinct keys.
  • Two people are required to use two keys when communicating back and forth.

Public-Key Distribution

  • People don’t need to share the same key as they do in symmetric approaches.
  • Public keys are open and available to everyone to use.

Network-Layer Security

  • Network-layer security is applied between hosts, routers, etc., to protect applications using the network layer.

IPSec Modes

  • IPSec operates in transport or tunnel mode.
    • Transport mode protects data delivered from the transport layer.
    • Tunnel mode protects the entire IP packet by applying IPSec security methods to the entire packet then adds a new IP header.

IPSec Security Protocols

  • IPSec defines the Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols for authentication for packets at the IP level.

Authentication Header (AH)

  • Ensures the integrity of the payload, authenticates the origin of the packet; It uses a hash function and the secret key to create a message digest.
  • AH doesn't provide confidentiality.

Encapsulating Security Payload (ESP)

  • Provides source authentication, integrity, and confidentiality using both a header and a trailer.

AH and ESP for IPv4 and IPv6

  • AH and ESP are part of the extension header for IPv6.

IPSec Provided Services

  • AH and ESP protocols provide security services for packets at the network layer.

Services

  • Access Control is provided by IPSec using a Security Association Database (SAD).
  • Message integrity is preserved in AH and ESP.
  • Entity authentication is possible via keyed-hash sent by the sender in both AH and ESP.
  • AH doesn't provide confidentiality.
  • Replay attacks are prevented through sequence numbers and a sliding receiver window in both protocols.

IPSec: Security Association

  • Each IPSec header holds a sequence number when the association is made.
  • When that number is maxed out, the association is deleted.
  • Window size is fixed at receiver.

Internet Key Exchange (IKE)

  • Designed to create inbound and outbound Security Associations as needed to send IP packets; consults the Security Policy Database (SPD).

Virtual Private Network (VPN)

  • A virtual private network (VPN) has gained in popularity.

Transport-Layer Security

  • It provides security for the application layer and uses the services of TCP or SCTP as a connection-oriented protocol.
  • Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocol provide this security at the transport layer.

SSL Security

  • SSL provides reliable transport layer protocol
  • SSL architecture was developed to provides security and communication services for data from the application layer.
  • Developed by Netscape

SSL - Services Provided

  • Fragmentation
  • Compression
  • Message Integrity
  • Confidentiality
  • Framing

SSL: Four Protocols in Two Layers

  • Defines four protocols in two layers for the idea itself.
    • Handles messages
    • SSL defines these protocols in it’s layers, as well as others.

SSL: Handshake Protocol

  • Authenticates the server, client, and messages needed to send private data.

SSL: Change Cipher Set Protocol

  • Exchange for cryptographic messages
  • Send/receive messages during the procedure.

SSL: Alert Protocol

  • Alerts used for reporting errors or abnormal activity

SSL: Record Protocol

  • Carries messages from the upper layer
  • Message is fragmented/compressed.
  • Negotiated hash algorithm

E-Mail Security

  • The creation of a session is not applicable to e-mails.
  • Two protocols provide mail security through Pretty Good Privacy and Secure/Multipurpose Internet Mail Extension (S/MIME).

Security Algorithms

  • Agree on cryptographic algorithms to use
  • No session to negotiate a hand shake for algorithms.
  • Alice includes her system information.
  • Identifier for the MD5 message.

Secured Keys Through Crytography

  • One time secret key sent with the message.
  • Key to protect from interception, secret key encrypted with public key.

Certificates

  • Certain algorithms must be used for e-mail key.
  • Messages need to be signed to encrypt the secret.

Pretty Good Privacy

  • Pretty Good Privacy (PGP) provides e-mail with privacy, integrity, and authentication.
  • Is often used to creat secure messages for e-mail.

PGP Authentication

  • Alice uses authentication that will need to show private data key and public data key.

Public Key Protection

  • Can be made more secure with data compression.

PGP: Key Rings

  • Used or needed for many individuals.
  • Alice should have public keys
  • In addition to PGP’s designer, specified a private /public key.

PGP Algorithms

  • A set of asymmetric-key techniques ,cryptography hashing and compressions.

PGP Certificates

  • Authentication is a key requirement to PGP
  • Public Keys is the security, in all similar steps.

S/MIME

  • Extension for e-mail access and secured communication via secured data.
  • Uses the MIME protocol.

Cryptograph Message Syntax

  • S/MIME defines how security services work.
  • Syntax defines the scheme
  • Referenced by RFC 3369/3370

Firewalls for Control

  • Need firewall to keep out unwanted information.
  • Forwards only some packets

Packet-Filter Firewalls

  • Packet blocker, to base packets on IP.
  • Transport/layer header
  • TCP/UDP
  • Router uses filtering patterns and discards unwanted content.

Proxy Firewalls

  • Based on the layer of transport through the network,
  • Can filter data based on message itself.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser