Protocols
Protocols
Unit-1
What is Cyber Security?
The technique of protecting internet-connected systems such as
computers, servers, mobile devices, electronic systems, networks, and
data from malicious attacks is known as cybersecurity. We can divide
cybersecurity into two parts one is cyber, and the other is security.
Cyber refers to the technology that includes systems, networks,
programs, and data. And security is concerned with the protection of
systems, networks, applications, and information. In some cases, it is
also called electronic information security or information
technology security.
Unit-1
• Information System
• Type of information system
• Development of information system
• CIA model of Information Characteristics
• Introduction to Information Security
• Need of Information Security, Cyber Security, Business need
• Ethical and Professional issues of security.
Information System
An information system can be defined as a set of interrelated
components that collect, manipulate, store data, distribute
information to support decision making and provide a
feedback mechanism to monitor performance. It may also
help the manager and workers to analyze problems, visualize
complex subject, and create new products. Software,
Hardware, information system users, computer system
connections and information, and the system's housing are all
part of an Information System.
Components of Information System
The components that must be combined together in order to produce an information system are:
People: Peoples are the most essential part of the information system because without them the system cannot be
operated correctly.
Hardware: It is the part of a physical component of an information system which we can touch. The information
system hardware includes the computer, processors, monitors, printer, keyboards, disk drives, iPads, flash drives, etc.
Software: It is a set of instruction that tells the hardware what to do. It can be used to organize, process and analyze
data in the information system.
Data: Data is a collection of facts. Information systems work with data. These data can be aggregated, indexed, and
organized into tables and files together to form a database. These databases can become a powerful tool for every
businesses information system.
Network: It includes internet, intranet, extranet to provide successful operations for all types of organizations and
computer-based information system.
Procedures: It specifies the policies that govern the operation of an information system. It describes how specific
method of data are processed and analyzed to get the answers for which the information system is designed.
Feedback: It is the component of an information system which defines that an IS may be provided with feedback.
1. Executive Information Systems (EIS)
It is a strategic-level information system which is found at the top of the Pyramid. Its primary goal is to provide
information gathered from both internal and external sources to the senior executives and management to analyze the
environment in which the organization operates, and to plan appropriate courses of action for identifying the long-term
trends. It can also be used to monitor organization performance as well as to identify opportunities and problems. EIS is
designed in such a way that it can be operated directly by executives without the need for intermediaries.
Information
Security
Availability
Business Need
To prevent data breaches
A data breach resulting in the loss of critical business information is quite common. Due to a large amount of data
stored on company servers, businesses often become the main target of cyber-criminals if the network is
unprotected. The breaches involving business secrets, confidential health information, and intellectual property
can greatly impact the overall health of a business.
To check for compromised credentials and broken authentication
Data breaches and other cyber attacks are usually a result of lax authentication, weak passwords, and poor
certificate or key management. Companies often struggle with assigning permissions to appropriate users or
departments, resulting in identity theft.
Privacy
Nowadays, computer users can access different information from various servers
located all over the world. Though the users have their private computer, tools, and
operating system, their network is distributed at a large scale when they try to access
information. As a result, their information is likely to be disclosed to various
organizations, and their privacy is not maintained.
Furthermore, hackers often intrude into the computer system of people and access the
user's information without authorization. Some organizations also sell the information
and data of their users. This also raises the question of user information privacy.
Access right
Lots of industries use computer software and technology to provide services to their
customers. This software should be capable of preventing unauthorized access to the
system.
Especially in payment or banking software, the developers need to create software that
guarantees authorized access and stops malware, viruses, or unauthorized access to the
system.
Prevention of loss
According to this ethical principle, information technology should not be used in a
manner that would cause harm or loss of property, information, ownership, or
destruction of the property. The employees, users, and other public should use all the
equipment with care to prevent any severe loss.
In computer science, ethics are regarded as how professionals
make decisions for professional and social conduct. There are
rules and practices that determine what is right or wrong. Ethical
issues occur when a decision or activity creates a dispute with
society's moral policies. They could be generated due to an
individual or an entire organization.
UNIT-II
• Information Security Model
• Component of an Information security
• Aspect of information security
• Security attacks (Active and Passive Attacks)
• Security mechanism and Security Services (X.800)
What is Information Security
Information security covers the tools and processes that organizations use to protect information. This
includes policy settings that prevent unauthorized people from accessing business or personal information.
InfoSec is a growing and evolving field that covers a wide range of fields, from network and infrastructure
security to testing and auditing.
Information security protects sensitive information from unauthorized activities, including inspection,
modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of
critical data such as customer account details, financial data or intellectual property.
Information Security Model
• A model describes the system
• e.g., a high level specification or an abstract machine
description of what the system does
• A security policy
• defines the security requirements for a given system
• Verification techniques that can be used to show that
a policy is satisfied by a system
• System Model + Security Policy = Security Model
Information Security Model
A security model is a computer model which can be used to identify and impose security policies. It does not
need some prior formation it can be founded on the access right model or analyzing computing model or
computation model.
A security model is a structure in which a security policy is developed. The development of this security policy is
geared to a specific setting or instance of a policy. A security policy is based upon authentication, but built
inside the confines of a security model. For example, designing a security model based upon authentication
and authorization, one consider the 4-factor model of security, such as authentication, authorization, availability,
and authenticity.
A security policy determines how data is accessed, what level of security is needed, and what procedure should
be taken when these requirements are not met. The policy framework the expectations of a computer system or
device.
If a security policy states that no one from a lower security level should be able to view or change data at a
higher security level, the supporting security model will define the essential logic and rules that require to be
implemented to provide that under no situations can a lower-level subject access a higher-level object in an
unauthorized manner. A security model supports a higher description of how a computer operating system
should be created to properly provide a definite security policy.
Information Security Models overpass the gap between security policy declarations (define which users should
have access to data) and the operating system execution (which allows a management to organize access
control). The models provide map theoretical objective onto mathematical associations that strengthen
whichever execution is finally selected.
Component of an Information security
The protection of computer systems and networks from information disclosure, theft of, or damage to
their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they
provide.[
INFORMATION SECURITY MANAGEMENT
Information security management describes the set of policies and procedural controls that IT and
business organizations implement to secure their informational assets against threats and vulnerabilities.
Many organizations develop a formal, documented process for managing InfoSec ,called an Information
Security Management System
Network security is any activity designed to protect the
usability and integrity of your network and data.
•It includes both hardware and software technologies
•It targets a variety of threats
•It stops them from entering or spreading on your network
•Effective network security manages access to the network
ASPECT OF INFORMATION SECURITY
While confidentiality, integrity, and authenticity are the significant concerns of an information security manager, privacy is the
essential aspect of information security for web users.
Authenticity − Authentication defines that users are who they request to be. Availability defines that resources are available by
authorized parties; “denial of service” attacks, which are the subject matter of national news, are attacks against availability.
The concerns of information security professionals are access control and Nonrepudiation. Authorization defines the power that
it can have over distinguishing authorized users from unauthorized users, and levels of access in-between. Authenticity defines
the constant checks that it can have to run on the system to make sure sensitive places are protected and working perfectly.
Integrity − Integrity defines that information is protected against unauthorized changes that are not perceptible to authorized
users; some incidents of hacking compromise the integrity of databases and multiple resources.
Accuracy − The accuracy and completeness of information systems and the data supported within the systems should be an
administration concern. Information which has been inappropriately changed or destroyed (by external or employees) can
impact the organization. Each organization should make controls to provide that data entered into and saved in its automated
files and databases are complete and accurate, and provide the accuracy of disseminated data.
Confidentiality − The principle of confidentiality defines that only the sender and the intended recipient(s) must be able to
create the content of a message. Confidentiality have compromised if an unauthorized person is able to create a message.
Access Control − The principle of access control decides who must be able to access what. For example, it must be able to
define that user A can view the data in a database, but cannot refresh them. User A can be allowed to create updates as well.
An access-control mechanism can be install to provide this.
Access control is associated to two areas including role management and rule management. Role management apply on the
user side, whereas rule management targets on the resources side.
Security mechanism and Security Services
(X.800)
X.800 defines a security service as a service that is provided by a protocol layer of
communicating open systems and that ensures adequate security of the systems or
of data transfers. Perhaps a clearer definition is found in RFC 4949, which provides
the following definition: a processing or communication service that is provided by
a system to give a specific kind of protection to system resources; security services
implement security policies and are implemented by security mechanisms.
X.800 divides these services into five categories and fourteen specific services
(Table 1.2).
Security Mechanisms (X.800)
SPECIFIC SECURITY MECHANISMS May be incorporated into the appropriate protocol layer in order to provide
some of the OSI security services.
Encipherment The use of mathematical algorithms to transform data into a form that is not readily intelligible. The
transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
Digital Signature Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data
unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).
Access Control A variety of mechanisms that enforce access rights to resources.
Data Integrity A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
PERVASIVE SECURITY MECHANISMS Mechanisms that are not specific to any particular OSI security service or
protocol layer.
Trusted Functionality That which is perceived to be correct with respect to some criteria (e.g., as established by a
security policy).
Security Label The marking bound to a resource (which may be a data unit) that names or designates the security
attributes of that resource.
Event Detection Detection of security-relevant events.
Security Audit Trail Data collected and potentially used to facilitate a security audit, which is an independent review
and examination of system records and activities.
Security Recovery Deals with requests from mechanisms, such as event handling and management functions, and takes
recovery actions.
SPECIFIC SECURITY MECHANISMS
Authentication Exchange
A mechanism intended to ensure the identity of an entity by means of information exchange.
Traffic Padding
The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Routing Control
Enables selection of particular physically secure routes for certain data and allows routing changes,
especially when a breach of security is suspected.
Notarization
The use of a trusted third party to assure certain properties of a data exchange.
Unit-III
Security Policy
Unit-4
Privacy Policy
The objective of this policy is to model the correct use of sensitive personal data, such as
medical data, biometric data, and financial data, in terms of the agreed-upon rationale for
utilizing these sensitive personal data and to protect them from violations . Accordingly, it
prevents the disclosure, use, access, collection, transfer, and exchange of sensitive personal
data without the knowledge of persons, by tightening control via user consent, or a
responsibility to keep data safe by a data-controlling organization’s trustworthy
administration
Data-Protection Policy
The goal of this policy is to protect the processing and management of personal data. This
policy guarantees that third-party data are collected, utilized, shared, stored, transported, and
sent securely, to use the data for needed and defined reasons. It also establishes the
anticipated behavior of employees when dealing with such material. Moreover, this policy
describes how businesses should handle consumer data and raises user awareness to prevent
data loss
Security Policies
Security policies are a formal set of rules which is issued by an organization to ensure that
the user who are authorized to access company technology and information assets comply
with rules and guidelines related to the security of information. It is a written document in
the organization which is responsible for how to protect the organizations from threats and
how to handles them when they will occur. A security policy also considered to be a
"living document" which means that the document is never finished, but it is continuously
updated as requirements of the technology and employee changes.
Need of Security policies-
1) It increases efficiency.
The best thing about having a policy is being able to increase the level of consistency which
saves time, money and resources. The policy should inform the employees about their
individual duties, and telling them what they can do and what they cannot do with the
organization sensitive information.
2) It upholds discipline and responsibility
When any human mistake will occur, and system security is compromised, then the security
policy of the organization will back up any disciplinary action and also supporting a case in
a court of law. The organization policies act as a contract which proves that an organization
has taken steps to protect its academic property, as well as its customers and clients.
3) It can make or break a business deal
It is not necessary for companies to provide a copy of their information security policy to
other vendors during a business deal that involves the transference of their sensitive
information. It is true in a case of bigger businesses which ensures their own security
interests are protected when dealing with smaller businesses which have less high-end
security systems in place.
4) It helps to educate employees on security literacy
A well-written security policy can also be seen as an educational document which
informs the readers about their importance of responsibility in protecting the
organization sensitive data. It involves on choosing the right passwords, to providing
guidelines for file transfers and data storage which increases employee's overall
awareness of security and how it can be strengthened.
We use security policies to manage our network security. Most types of security policies are automatically
created during the installation. We can also customize policies to suit our specific environment. There are
some important cyber security policies recommendations describe below-
1. Virus and Spyware Protection policy
This policy provides the following protection:
It helps to detect, removes, and repairs the side effects of viruses and security risks by using signatures.
It helps to detect the threats in the files which the users try to download by using reputation data from
Download Insight.
It helps to detect the applications that exhibit suspicious behavior by using SONAR heuristics and
reputation data.
2. Firewall Policy
This policy provides the following protection:
It blocks the unauthorized users from accessing the systems and networks that connect to the Internet.
It detects the attacks by cybercriminals.
It removes the unwanted sources of network traffic.
3. Intrusion Prevention policy
This policy automatically detects and blocks the network attacks and browser attacks. It
also protects applications from vulnerabilities. It checks the contents of one or more data
packages and detects malware which is coming through legal ways.
4. Live Update policy
This policy can be categorized into two types one is Live Update Content policy, and
another is Live Update Setting Policy. The Live Update policy contains the setting which
determines when and how client computers download the content updates from Live
Update. We can define the computer that clients contact to check for updates and schedule
when and how often clients computer check for updates.
5. Application and Device Control
This policy protects a system's resources from applications and manages the peripheral
devices that can attach to a system. The device control policy applies to both Windows and
Mac computers whereas application control policy can be applied only to Windows
clients.
Why are security policies important?
Security policies are important because they protect an organizations' assets, both
physical and digital. They identify all company assets and all threats to those assets.
5. IPR
Intellectual property rights is a right that allow creators, or owners of patents, trademarks
or copyrighted works to benefit from their own plans, ideas, or other intangible assets or
investment in a creation. These IPR rights are outlined in the Article 27 of the Universal
Declaration of Human Rights. It provides for the right to benefit from the protection of
moral and material interests resulting from authorship of scientific, literary or artistic
productions. These property rights allow the holder to exercise a monopoly on the use of
the item for a specified period.
6. Software licensing in cyber law
A software license is a document that provides legally binding guidelines for the use
and distribution of software. Software licenses typically provide end users with the
right to one or more copies of the software without violating copyrights.
Cyber Law
Cyber Law also called IT Law is the law regarding Information-technology including
computers and the internet. It is related to legal informatics and supervises the digital
circulation of information, software, information security, and e-commerce.
IT law does not consist of a separate area of law rather it encloses aspects of contract,
intellectual property, privacy, and data protection laws. Intellectual property is a key
element of IT law. The area of software license is controversial and still evolving in
Europe and elsewhere.
According to the Ministry of Electronics and Information Technology, Government of India :
Cyber Laws yields legal recognition to electronic documents and a structure to support e-filing and
e-commerce transactions and also provides a legal structure to reduce
Importance of Cyber Law:
•It covers all transactions over the internet.
•It keeps eye on all activities over the internet.
•It touches every action and every reaction in cyberspace.
Defamation:
Several personnel uses the internet to speak their mind. When people use the
internet to say things that are not true, it can cross the line into defamation.
Defamation laws are civil laws that save individuals from fake public statements
that can harm a business or someone’s reputation. When people use the internet to
make statements that violate civil laws, that is called Defamation law.
Trade Secrets:
Companies doing business online often depend on cyber laws to protect their trade
secrets. For example, Google and other online search engines spend lots of time
developing the algorithms that produce search results. They also spend a great deal of
time developing other features like maps, intelligent assistance, and flight search
services to name a few. Cyber laws help these companies to take legal action as
necessary to protect their trade secrets.
•Digital signatures have been given legal validity and sanction in the Act.
•It has opened the doors for the entry of corporate companies for issuing Digital
Signatures Certificates in the business of being Certifying Authorities.
•It gives authority to the companies or organizations to file any form, application,
or any other document with any office, authority, body, or agency owned or
controlled by the suitable Government in e-form using such e-form as may be
prescribed by the suitable Government.
•The IT Act also addresses the important issues of security, which are so critical
to the success of electronic transactions.
SSL
DNSSEC
What is SSL?
TCP
IP
11
SSL components
• SSL Handshake Protocol
– negotiation of security algorithms and parameters
– key exchange
– server authentication and optionally client authentication
• SSL Record Protocol
– fragmentation
– compression
– message authentication and integrity protection
– encryption
• SSL Alert Protocol
– error messages (fatal alerts and warnings)
• SSL Change Cipher Spec Protocol
– a single message that indicates the end of the SSL handshake
12
SSL Record Protocol Operation
13
SSL Handshake
14
SSL Handshake Protocol – overview
client server
client_hello Phase 1: Negotiation of the session ID, key exchange
server_hello algorithm, MAC algorithm, encryption algorithm, and
exchange of initial random numbers
certificate
Phase 2: Server may send its certificate and key
server_key_exchange
exchange message, and it may request the client
certificate_request to send a certificate. Server signals end of hello
phase.
server_hello_done
certificate
Phase 3: Client sends certificate if requested and may
client_key_exchange send an explicit certificate verification message.
certificate_verify Client always sends its key exchange message.
change_cipher_spec
finished
Phase 4: Change cipher spec and finish handshake
change_cipher_spec
finished
15
• SSL includes two sub-protocols: the SSL
Record Protocol and the SSL Handshake
Protocol.
• Record Protocol -- defines the format used to
transmit data.
• Handshake Protocol -- using the Record
protocol to exchange messages b/t an SSL-
enable server and an SSL-enable client.
SSL—The Secure Sockets Layer
• Layers (and protocols) for a home user
browsing with SSL.
DNSSEC (DNS Security Extensions)
DNSSEC Mechanisms
Server vulnarability
Secondary
Man in the Middle DNS
primary
DNS
Registry spoofing
&
Secondary Man in the Middle
DNS
DNSSEC protects all these end-
to-end
• As an aside:
There is a protection mechanism against the man
in the middle: TSIG(Transaction Signature)
– Provides hob-by-hop security
– TSIG is operationally deployed today
– Based on shared secret: not scalable
What does DNSSEC provide
• provides message authentication and integrity verification through
cryptographic signatures
– You know who provided the signature
– No modifications between signing and validation
• It does not provide authorization
• It does not provide confidentiality
• It does not provide protection against DDOS
Metaphor
OK
Metaphor
• Envelope sealed when
data is published in the
DNS system
• Does not provide OK
confidentially
• The seal protects the
delivery process
• No assertion about the
message
OK
Data flow through the DNS
End to end security
Registrars
& Registrants
O
O K
K Secondary
DNS
primary
DNS
Registry
Secondary
DNS
Trust and DNS system
Confidence
Registry system
• DNSSEC enables confidence in the DNS
• It does not change the trust we put in the
Registry/Registrar procedures
– Although introduction of DNSSEC may
improve some of the procedures
The mechanism used
• Using public key cryptographic algorithms
signatures are applied over the DNS data
• By comparing the signatures with public keys
the integrity and authenticity of the data can
be established.
Public key cryptography
in a nutshell
• Two large numbers and an encryption and
decryption algorithm
• If one of the numbers (the private key) and a
message are used for encryption
• The other number (public key) and the
decryption algorithm can be used to retrieve
the original message
Hash Function
A message digest is as a
``digital fingerprint'' of the
original document
1
Hashing V.S. Encryption
Hello, world. k NhbXBsZSBzZW50ZW5jZS
A sample sentence to E B0byBzaG93IEVuY3J5cHR
show encryption. pb24KsZSBzZ
Hello, world. k
NhbXBsZSBzZW50ZW5jZS
A sample sentence to D
B0byBzaG93IEVuY3J5cHR
show encryption. pb24KsZSBzZ
Iam#4VKU Iam#4VKU
Password
store
h h
Hash Matching
Exactly?
Password
Yes No
store Deny
Grant
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
Attack on Hash Function
The Road to new Secure Hash Standard
Hash Function Usages (I)
Fixed length L
This is a clear text that
can easily read without
52f21cf7c7034a20
using the key. The h
17a21e17e061a863
sentence is longer than
the text above.
Given one message, can’t find another message that has the same message digest. An attack that
finds a second message with the same message digest is a second pre-image attack.
It would be easy to forge new digital signatures from old signatures if the hash function used
weren’t second preimage resistant
Collision Resistant
Can’t find any two different messages with the same message digest
Collision resistance implies second preimage resistance
Collisions, if we could find them, would give signatories a way to repudiate their signatures
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
Attack on Hash Function
The Road to new Secure Hash Standard
Two Group of Compression Functions
The compression function is made from scratch
Message Digest
21
MD2, MD4 and MD5
Family of one-way hash functions by Ronald Rivest
All produces 128 bits hash value
MD2: 1989
Optimized for 8 bit computer
Collision found in 1995
MD4: 1990
Full round collision attack found in 1995
MD5: 1992
Specified as Internet standard in RFC 1321
since 1997 it was theoretically not so hard to create a collision
Practical Collision MD5 has been broken since 2004
CA attack published in 2007
MD5 Overview
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
MD5
SHA
Attack on Hash Function
The Road to new Secure Hash Standard
MD5 Overview
2. Append
length
(64bits)
1. Append padding
bits
(to 448 mod 512)
16 steps
Single step
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
MD5
SHA
Attack on Hash Function
The Road to new Secure Hash Standard
Secure Hash Algorithm
SHA originally designed by NIST & NSA in 1993
revised in 1995 as SHA-1
US standard for use with DSA signature scheme
standard is FIPS 180-1 1995, also Internet RFC3174
based on design of MD4 with key differences
produces 160-bit hash values
recent 2005 results on security of SHA-1 have raised concerns
on its use in future applications
Revised SHA
NIST issued revision FIPS 180-2 in 2002
adds 3 additional versions of SHA
SHA-256, SHA-384, SHA-512
designed for compatibility with increased security
provided by the AES cipher
structure & detail is similar to SHA-1
hence analysis should be similar
but security levels are rather higher
SHA Versions
What is the number of padding bits if the length of the original message
is 2590 bits?
We can calculate the number of padding bits as follows:
"md5 and sha1 are both clearly broken (in terms of collision-resistance”
Ron Rivest
http://mail.python.org/pipermail/python-dev/2005-December/058850.html
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
MD5
SHA
Attack on Hash Function
The Road to new Secure Hash Standard
The need of new Hash standard
MD5 should be considered cryptographically broken and
unsuitable for further use, US CERT 2010
In 2004, a collision for the full SHA-0 algorithm was
announced
Unit-3
What is a watermark ?
What is a watermark ? A distinguishing mark impressed on
paper during manufacture; visible when paper is held up to
the light (e.g. INR Bill)
◼ According to Robustness
◼ Fragile
◼ Semi fragile
◼ Robust
Unit-3
Public Key Authentication
Public Key Requirements
1. computationally easy to create key pairs
2. computationally easy for sender knowing public key to
encrypt messages
3. computationally easy for receiver knowing private key to
decrypt ciphertext
4. computationally infeasible for opponent to determine private
key from public key
5. computationally infeasible for opponent to otherwise
recover original message
6. useful if either key can be used for each role
Public Key Algorithms
RSA (Rivest, Shamir, Adleman)
developed in 1977
only widely accepted public-key encryption algorithm
given tech advances need 1024+ bit keys
RSA
➢ to encrypt a message M the sender:
⚫ obtains public key of recipient PU={e,n}
⚫ computes: C = Me mod n, where 0≤M<n
➢ to decrypt the ciphertext C the owner:
⚫ uses their private key PR={d,n}
⚫ computes: M = Cd mod n
➢ note that the message M must be smaller than
the modulus n (block if needed)
RSA Key Setup
➢ each user generates a public/private key pair by:
➢ selecting two large primes at random: p, q
➢ computing their system modulus n=p.q
⚫ note ø(n)=(p-1)(q-1)
➢ selecting at random the encryption key e
⚫ where 1<e<ø(n), gcd(e,ø(n))=1
Cryptographic Protocols
• Arbitrated Protocols
• In a computer protocol arbiter is a trustworthy third party who
ensures fairness. The arbiter might be a person , a program, or a
machine. For example, in a network an arbiter might be a
program running on one machine of the network. The program
receives and forwards messages between users. The user trust
that when the arbiter forwards a message saying it comes from
A, the message really did come from user A.the notion of an
arbiter is the basis for type of secure protocol called an
arbitrated protocol.
Arbitrated Protocols disadvantages
• The two sides may not be able to find a neutral third party that
both sides trust. Suspicious users are rightfully suspicious of
unknown arbiter in a network.
• Maintaining the availability of an arbiter represents a cost to the
users or the network ; that cost may be high.
• Arbitration causes a time delay in communication because a third
party must receive, act on, and then forward every transaction.
• If the arbitration service is heavily used, it may become a
bottleneck in the network as many users try to access a single
arbiter.
• Secrecy becomes weak, because the arbiter has access to much
sensitive information.
• Adjudicated Protocols
Its able to see all sides third party to judge fairness based on
evidences.
Not only can a third party determine whether two parties
acted fairly, that is, within the rules of the protocol, but
third party can also determine who cheated.
Adjudicated protocols involve the services of a third party
only in case of a dispute. Therefore, they are usually less
costly, in terms of machine time or access to a trusted third
party software judge, than arbitrated protocols. However,
adjudicated protocols detect a failure to cooperate only
after the failure has occurred
Hash Function Requirements
A hash function H must have the following properties:
• H can be applied to a block of data of any size
• H produces a fixed-length output
• H(x) is relatively easy to compute for any given x,
making both hardware and software implementations
practical
• For any given code h, it is computationally infeasible
to find x such that h(x)=h
• For any given block x, it is computationally infeasible
to find yx with h(y)=h(x)
• It is computationally infeasible to find any pair (x, y)
such that h(x)=h(y)
Message Authentication Using a One-
Message
Way Hash Function
Message
Message
H
Compare
K
H
K
D
E
Message
Message
H
Compare
Kpublic
H
Kprivate
D
E
Types of IT security
•Network security. Network security is used to
prevent unauthorized or malicious users from
getting inside your network. ...
•Internet security. ...
•Endpoint security. ...
•Cloud security. ...
•Application security.
Cryptography
Terminology of Cryptography
Types of Security Protocols
• Arbitrated protocols
– Involving a trusted third party
• Adjudicated protocols
– Trusted third party, after the fact
• Self-enforcing protocols
– No trusted third party
Key Exchange With Symmetric
Encryption and an Arbitrator
KA KB
Alice Bob
Alice
Who knows
Requests
what at this
Session
point?
Key for
Bob KA Trent KB
Step Two
KA KB
Alice Bob
EKA(KS),
EKB(KS) Who knows
what at this
EKA(KS), point?
EKB(KS)
KA Trent KB
KS
Step Three
KS KS
KA EKB(KS) KB
Alice Bob
EKA(KS),
EKB(KS) Who knows
what at this
point?
KA Trent KB
KS
What Has the Protocol Achieved?
• Alice and Bob both have a new session key
• The session key was transmitted using keys
known only to Alice and Bob
• Both Alice and Bob know that Trent
participated
• But there are vulnerabilities
Problems With the Protocol
• What if the initial request was grabbed by
Mallory?
• Could he do something bad that ends up
causing us problems?
• Yes!
The Man-in-the-Middle Attack
• A class of attacks where an active attacker
interposes himself secretly in a protocol
• Allowing alteration of the effects of the
protocol
• Without necessarily attacking the encryption
Applying the Man-in-the-Middle
Attack
KA KB
Alice KM
Bob
Mallory
Alice
Alice Who knows what at
this point?
Requests
Requests More precisely, what do
they think they know?
Session
Session
Key for
Key for
Mallory
Bob KA Trent KB
KM
Trent Does His Job
KA KB
Alice KM
Bob
EKA(KS), Mallory
EKM(KS)
KA Trent KB
KM
Alice Gets Ready to Talk to Bob
EKM(KS)
KS
KA KB
Alice KM
Bob
Mallory
KS EKM(KS) EKM(KS) Mallory can now
masquerade as
Bob
KA Trent KB
KM
Really Getting in the Middle
KA KB
Alice KM
Bob KS1
EKM(KS1), Mallory KS
KS EKB(KS1) KS1 EKB(KS1)