Itnas - Endterm Reviewer
Itnas - Endterm Reviewer
1
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
Components of a Cryptosystem
Plaintext. It is the data to be
protected during transmission.
Encryption Algorithm. It is a
mathematical process that
produces a ciphertext for any
given plaintext and encryption
key. It is a cryptographic
What is Cryptography?
algorithm that takes plaintext and
Is the art and science of making a
an encryption key as input and
cryptosystem that is capable of
produces a ciphertext.
providing information security.
Ciphertext. It is the scrambled
Deals with the actual securing of
version of the plaintext produced
digital data.
by the encryption algorithm using
a specific the encryption key. The
Cryptosystem: A system which
ciphertext is not guarded. It flows
converts plain text to cipher text or
on public channel. It can be
cipher text to plain text by the
intercepted or compromised by
application of encryption or
anyone who has access to the
decryption algorithm.
communication channel.
Decryption Algorithm, It is a
CRYPTOSYSTEM MODEL
mathematical process, that
produces a unique plaintext for
any given ciphertext and
decryption key. It is a
cryptographic algorithm that
takes a ciphertext and a
decryption key as input, and
outputs a plaintext.
2
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
Attacks on Cryptosystems
PASSIVE ATTACKS
The main goal of a passive attack
is to obtain unauthorized
access to the information.
For example, actions such as
intercepting and eavesdropping
on the communication channel
can be regarded as passive
attack.
These actions are passive in
nature, as they neither affect
information nor disrupt the
communication channel. A
passive attack is often seen as
stealing information. The only
difference in stealing physical
goods and stealing information is
that theft of data still leaves the
owner in possession of that data.
Passive information attack is thus
more dangerous than stealing of
goods, as information theft may
go unnoticed by the owner.
3
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
4
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
TRANSPOSITION CIPHER
EXAMPLES
Encrypt the message “HELLO MY
DEAR,” using the key shown in
Transposition cipher.
Solution
We first remove the spaces in the
message. We then divide the text
into blocks of four characters. We
add a bogus character Z at the end
of the third block. The result is HELL
OMYD EARZ. We create a three-block
ciphertext ELHLMDOYAZER.Using
the example decrypt the message
“ELHLMDOYAZER”.
Solution
The result is HELL OMYD EARZ. After
removing the bogus character and
combining the characters, we get
the original message “HELLO MY
DEAR.”
5
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
6
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
7
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
Some groups (notably NSA) add two • Assets may have intrinsic
more high level security goals to value as well as acquired
derive CIA-AN: value (a storage array may
• Authenticity have a higher value than
• Nonrepudiation the
• value of the underlying disks and
DREAD controllers).
DREAD is another system from • Intellectual property valuation
Microsoft. Unlike STRIDE, it not only may depend on the cost to
classifies potential threats, but also acquire or produce the
ranks them. Compute 5 potential intellectual property, its worth
subscores for each vulnerability (e.g. how much it can make over
(scale 1..10) and for each of: its lifetime), and how much it
• Damage potential costs to protect it.
• Reproducibility (or Reliability)
• Exploitability Some Metrics
• Affected users Single Loss Expectancy: depends on
• Discoverability percentage loss if a vulnerability is
Add scores together and divide by 5 exploited; (SLE = asset value *
to get an overall DREAD score. exposure factor).
8
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
9
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
10
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
Opportunities:
11
INFORMATION ASSURANCE AND SECURITY | 1ST SEMESTER | ENDTERM
Call to Action:
• Encourage students to pursue
cybersecurity careers.
• Promote responsible online
practices.
• Support national efforts to build a
secure digital environment.
12