Security Goals: Cryptography and Network Security B.Tech (CSE) IV Year I Sem
Security Goals: Cryptography and Network Security B.Tech (CSE) IV Year I Sem
SECURITY GOALS
Cryptographic Attacks
Accessing of data by unauthorized entity is called as attack
Passive Attacks
Active Attacks
Passive Attacks:
In a passive attack, the attacker’s goal is just to obtain information. This means that the attack does not
modify data or harm the system.
Active Attacks:
An active attack may change the data or harm the system. Attacks that threaten the integrity and availability
are active attacks.
Passive Attacks
(a) Release of message content –
Capture and read the content transmissions.
(b) Traffic Analysis–
• can’t read the information, but observe the pattern
• determine the location and identity of communicating parties
• observe frequency and length of communication
Active Attacks
(a) Masquerading: Masquerading or snooping happens when the attacker impersonates somebody else.
(b) Replay–
The attacker obtains a copy of a message sent by a user and later tries to replay it.
(c) Modification: After intercepting or accessing information, the attacker modifies the information then
send to receiver.
(d) Denial of service: Denial of service (Dos) is a very common attack.it may slow down or totally interrupt
the service of a system.
• The attacker thus guesses the key and looks for the distinguishing property. if the property is
detected, the guess is correct otherwise the next guess is tried.
Non-Cryptanalytic Attacks:
• The other types of attacks are non-cryptanalytic attacks, which do not explain the mathematical
weakness of the cryptographic algorithm.
• Data Confidentiality: It is designed to protect data from disclosure attack.. That is, it is designed to
prevent snooping and traffic analysis attack.
• Data Integrity: It is designed to protect data from modification, insertion, deletion and replaying by
an adversary
• Authentication: It provides the authentication of the party at the other end of the line.
• Non-repudiation: It protects against repudiation by either the sender or the receiver of the data.
• Access Control: It provides protection against unauthorized access to data
Security Mechanism:
• Encipherment:The use of mathematical algorithms to transform data into a form that is not readily
understandable
• Data Integrity:A variety of mechanisms used to assure the integrity of a data unit or stream of data
units.
• Digital Signature:A digital signature is a means by which the sender can electronically sign the data
and the receiver can electronically verify the signature.
• Authentication Exchange: A mechanism intended to ensure the identity of an entity by means of
information exchange.
• Routing Control:Enables selection of particular physically secure routes for certain data and allows
routing changes, especially when a breach of security is suspected.
• Traffic Padding: Inserting bogus data to prevent traffic analysis.
• Notarization:The use of a trusted third party to assure certain properties of a data exchange.
• Access Control:A variety of mechanisms that enforce access rights to resources.
Relation Security Services and Mechanisms
➢ Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
➢ Security Service: A service that enhances the security of data processing systems and information
transfers. A security service makes use of one or more security mechanisms.
MATHEMATICS OF CRYPTOGRAPHY
Integer Arithmetic: In Integer arithmetic, we are use a set and a few operations.
➢ Set of Integers: The set of Integers, denoted by z, contains all integral numbers (with no fraction)
from negative infinity to positive infinity.
➢ Binary Operations: A Binary operation takes two inputs and creates one output. Three common
binary operations defined for integers are addition, subtraction and multiplication.
➢ Examples:
Add: 5+9=14 (-5)+9=4 5+(-9)=-4
Subtract: 5-9=-4 (-5)-9=14 5-(-9)=14
Multiply: 5x9=45 (-5)x9=-45 5x(-9)=45
Integer Division: if we divide a by n, we can get q and r. The relationship between these four integers can be
shown as
a=q x n + r
a is dividend, n is the divisor, q is quotient , r is remainder
➢ Examples: Assume that a = 255 and n = 11. We can find q = 23 and r = 2 using the division
algorithm. We have shown in following
Two Restrictions:
• First, we require that the divisor be a positive integer (n > 0).
• Second, we require that the remainder be a non-negative integer ( r > 0 ).
Integer Division