Intro To Crypto
Intro To Crypto
Network Security
Introduction
Background
➢ Information Security requirements have
changed in recent times
➢ traditionally provided by physical and
administrative mechanisms
➢ computer use requires automated tools to
protect files and other stored information
➢ use of networks and communications links
requires measures to protect data during
transmission
Definitions
➢ Computer Security - generic name for
the collection of tools designed to protect
data and to thwart hackers
➢ Network Security - measures to protect
data during their transmission
➢ Internet Security - measures to protect
data during their transmission over a
collection of interconnected networks
Aim of Course
➢ our focus is on Internet Security
➢ which consists of measures to deter,
prevent, detect, and correct security
violations that involve the transmission &
storage of information
Cryptography, a word in
Greek means?
a. Corrupting data
b. Secret writing
c. Open writing
d. Closed writing
The process of transforming a message
to unreadable form is called?
a. Compression
b. Encryption
c. Hiding
Aspects of Security
➢ consider 3 aspects of information
security:
⚫ security attack
⚫ security mechanism
⚫ security service
Security Attack
⚫ active
Passive
Attacks
Passive Attacks
➢ Two types of
• Are in the nature of
eavesdropping on, or passive attacks
monitoring of, are:
transmissions ⚫ The release of
• Goal of the opponent message
is to obtain information contents
that is being transmitted ⚫ Traffic analysis
Active Attacks
Active Attacks
➢ Involve some modification of
the data stream or the creation • Takes place when one entity
pretends to be a different entity
of a false stream Masquerade • Usually includes one of the other
forms of active attack
➢ Difficult to prevent because of
the wide variety of potential
physical, software, and network
• Involves the passive capture of a
vulnerabilities data unit and its subsequent
Replay retransmission to produce an
➢ Goal is to detect attacks and to unauthorized effect
recover from any disruption or
delays caused by them
• Some portion of a legitimate
Modification message is altered, or messages
of messages are delayed or reordered to
produce an unauthorized effect
Wiring,
eavesdrop
Modification: unauthorized changing
of data or tempering with services,
such as alteration of data,
modification of messages, etc.
Replaced
intercept
info
Fabrication: additional data or
activities are generated that would
normally no exist, such as adding a
password to a system, replaying
previously send messages, etc.