• Tidak ada hasil yang ditemukan

Cryptography and Network Security -W. Stalling (2nd Ed.)

N/A
N/A
Protected

Academic year: 2024

Membagikan "Cryptography and Network Security -W. Stalling (2nd Ed.)"

Copied!
12
0
0

Teks penuh

(1)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 1

Cryptography and Network Cryptography and Network Cryptography and Network Cryptography and Network

Security Security Security Security - - -

-W. Stalling (2nd Ed.) W. Stalling (2nd Ed.) W. Stalling (2nd Ed.) W. Stalling (2nd Ed.)

Hoon Hoon Hoon

Hoon- - - -Jae Jae Jae Lee Jae Lee Lee Lee CNSL CNSL CNSL CNSL

Cryptography and Network Security Lab.

Cryptography and Network Security Lab. Cryptography and Network Security Lab.

Cryptography and Network Security Lab.

hjlee hjlee hjlee hjlee hjlee hjlee hjlee

hjlee@ @ @ @ @dongseo @ @ @ dongseo dongseo dongseo dongseo dongseo dongseo.ac. dongseo .ac. .ac. .ac. .ac. .ac. .ac.kr .ac. kr kr kr kr kr kr kr

http://cg.dongseo.ac.kr/~hjlee

‰ 1.1 Attacks, Services, and Mechanisms

‰ 1.2 Security Attacks

‰ 1.3 Security Services

‰ 1.4 A Model for Network Security

‰ 1.5 Outline of this Book

‰ 1.6 Recommended Reading

Chap 1. Introduction

(2)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 3

‰ Three aspects of information security: Three aspects of information security: Three aspects of information security: Three aspects of information security:

¾Security attackSecurity attackSecurity attackSecurity attack: compromises the security of information : compromises the security of information : compromises the security of information : compromises the security of information owned by an organization

owned by an organization owned by an organization owned by an organization

¾Security MechanismSecurity MechanismSecurity MechanismSecurity Mechanism: is designed to detect, prevent, or : is designed to detect, prevent, or : is designed to detect, prevent, or : is designed to detect, prevent, or recover from a security attack

recover from a security attack recover from a security attack recover from a security attack

¾Security serviceSecurity serviceSecurity serviceSecurity service:::: enhances the security of the data enhances the security of the data enhances the security of the data enhances the security of the data processing systems and the information transfers of an processing systems and the information transfers of an processing systems and the information transfers of an processing systems and the information transfers of an organization

organization organization organization

1.1 Attacks, Services, and Mechanisms

‰ Services: Services: Services: Services:

¾ConfidentialityConfidentialityConfidentialityConfidentiality: ensures that the information in a : ensures that the information in a : ensures that the information in a : ensures that the information in a computer system and transmitted information are computer system and transmitted information are computer system and transmitted information are computer system and transmitted information are accessible only for reading by authorized parties.

accessible only for reading by authorized parties.

accessible only for reading by authorized parties.

accessible only for reading by authorized parties.

¾AuthenticationAuthenticationAuthenticationAuthentication: ensures that the origin of a message or : ensures that the origin of a message or : ensures that the origin of a message or : ensures that the origin of a message or electronic document is correctly identified, with an electronic document is correctly identified, with an electronic document is correctly identified, with an electronic document is correctly identified, with an assurance that the identity is not false

assurance that the identity is not false assurance that the identity is not false assurance that the identity is not false

¾IntegrityIntegrityIntegrityIntegrity: ensures that only authorized parties are able to : ensures that only authorized parties are able to : ensures that only authorized parties are able to : ensures that only authorized parties are able to modify computer system assets and transmitted

modify computer system assets and transmitted modify computer system assets and transmitted modify computer system assets and transmitted information

information information information

¾NonNonNonNon----repudiationrepudiationrepudiationrepudiation: requires that neither the sender not the : requires that neither the sender not the : requires that neither the sender not the : requires that neither the sender not the receiver of a message be able to deny the transmission receiver of a message be able to deny the transmission receiver of a message be able to deny the transmission receiver of a message be able to deny the transmission

¾Access controlAccess controlAccess controlAccess control: requires that access to information : requires that access to information : requires that access to information : requires that access to information resources may be controlled by or for the target system resources may be controlled by or for the target system resources may be controlled by or for the target system resources may be controlled by or for the target system

¾AvailabilityAvailabilityAvailabilityAvailability: requires that computer system assets be : requires that computer system assets be : requires that computer system assets be : requires that computer system assets be available to authorized parties when needed

available to authorized parties when needed available to authorized parties when needed available to authorized parties when needed

1.1 Attacks, Services, and Mechanisms

(3)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 5

1.2 Security Attacks (1)

‰1. Threats to security

3Interruption 3Interception 3Modification 3Fabrication

1.2 Security Attacks (2)

(4)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 7

1.2 Security Attacks (3)

‰2. Methods of Attacks

3Ciphertext 3 Ciphertext Only Attack: Only Attack

Attacker has only the intercepted cryptogram.

3Known Plaintext Attack 3 Known Plaintext Attack:

Attacker knows plaintext equivalence of some ciphertext.

3Chosen Plaintext Attack 3 Chosen Plaintext Attack:

Attacker can obtain ciphertext equivalent to some plaintext selected by attacker.

1.3 Security Service (1)

‰ 1. Data Confidentiality

for the protection of data from unauthorized disclosure as described below

¾ Connection confidentiality

for the confidentiality of all (N)-user-data on an (N)-connection

¾ Connectionless confidentiality

for the confidentiality of all (N)-user-data in a single connectionless (N)-SDU

(5)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 9

1.3 Security Service (2)

‰ 1. Data Confidentiality (cont’d)

¾ Selective field confidentiality

for the confidentiality of selected fields within the (n)-user-data on an (n)-connection or in a single connectionless (N)-SDU

¾ Traffic flow confidentiality

for the protection of the information which might be derived from observation of traffic flows

1.3 Security Service (3)

‰2. Authentication

¾ Peer entity authentication

9This service, when provided by the (N)-layer, provides corroboration to the (N+1)-entity that the peer entity is the claimed (N+1)-entity.

¾ Data origin authentication

9This service, when provided by the (N)-layer,

provides corroboration to an (N+1)-entity that

the source of the data is the claimed peer

(N+1)-entity.

(6)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 11

1.3 Security Service (4)

‰ 3. Data integrity

These services counter active threats and may take one of the forms described below.

¾ Connection integrity with recovery

for the integrity of all (n)-user-data on an (n)- connection and detects any modification, insertion, deletion or replay of any data within an entire SDU sequence (with recovery attempted)

¾ Connection integrity without recovery

same as “connection integrity with recovery”but with no recovery attempted

1.3 Security Service (5)

¾ Selective field connection integrity

for the integrity of selected fields within the (n)-user data of an (N)-SDU transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed

¾ Connectionless integrity

provides integrity assurance to the requesting (n+1)- entity

¾ Selective field connectionless integrity

provides for the integrity of a single connectionless SDU and may take the form of determination of whether a received SDU has been modified

(7)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 13

1.3 Security Service (6)

‰5. Non-repudiation

¾ Non-repudiation with proof of origin :

The recipient of data provide with proof of the origin of data.

¾ Non-repudiation with proof of delivery :

The sender of data is provided with proof of delivery of data.

1.3 Security Service (7)

‰6. Access Control

¾ provides protection against unauthorized use of resources

‰7. Availability

¾ requires that computer system assets be

available to authorized parties when needed

(8)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 15

1.4 A Model for Network Security

Message Message

Secret information

Trusted third party (e.g., arbiter, distributer of secret data)

Trusted third party (e.g., arbiter, distributer of secret data)

Principal Principal

Opponent Opponent Secret

information

Information channel

Security-related transformation

Security-related transformation

Security Mechanism (1)

‰ 1. Encipherment

can provide confidentiality of either data or traffic flow information and can play a part in or element a

number of other security mechanisms

‰ 2. Digital signature mechanisms

A) signing a data unit; and B) verifying a signed data unit

‰ 3. Access control mechanisms

determine and enforce the access rights of the entity

(9)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 17

Security Mechanism (2)

‰ 4. Data integrity mechanisms

A) The integrity of a single data unit or field.

B) The integrity of a stream of data units or fields.

‰ 5. Authentication exchange mechanism

A) use of authentication information, such as passwords B) cryptographic techniques

C) use of characteristics and/or possessions of the entity

‰ 6. Traffic padding mechanism

to provide various levels of protection against traffic analysis

Security Mechanisms (3)

‰ 7. Routing control mechanism

¾ Routes can be chosen either dynamically or by prearrangement so as to use only physically secure sub-networks, relays or links.

‰ 8. Notarization mechanism

¾ The assurance is provided by a third party notary, which is trusted by the communicating entities, and which holds the necessary

information to provide the required assurance

in a testifiable manner.

(10)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 19

Peer Entity Authentication Data Origin Authentication Access Control Service Connection Confidentiality Connectionless Confidentiality Selective Field Confidentiality Traffic Flow Confidentiality Connection Integrity with Recovery

Connection Integrity without Recovery

Selective Field Connection Integrity

Connectionless Integrity Selective Field Connectionless Integrity

Non-reputation. Origin Non-reputation. Derivery

Y Y . Y Y Y Y Y Y Y Y Y . .

Y Y . . . . . . . . Y Y Y Y

. . Y . . . . . . . . . . .

. . . . . . . Y Y Y Y Y Y Y

Y . . . . . . . . . . . . .

. . . . . . Y . . . . . . .

. . . Y Y . Y . . . . . . .

. . . . . . . . . . . . Y Y

Encip

herment Encip

herment Encip

herment Encip

herm ent

Digital Signature Digital Signature Digital Signature Digital Signature Acces

s Control Acces

s Control Acces

s Control Acces

s Control Data Integrity Data Integrity Data Integrity Data Integrity Authen

ticati on Exch

ange

Authen ticati

on Exch ange

Authen ticati

on Exch ange

Authen ticati

on Exch ange

Traffic Padding Traf

fic Padding Traffic Padding Traf

fic Padding Routing Control Ro

uting Control Ro

uting Control Ro

uting Control Notarization Notarization Notar

ization Notar

ization

Mechanism Mechanism Mechanism Mechanism

Service ServiceService Service

Security Mechanism (4)

The mechanism is considered no to be appropriate Y Yes:the mechanism is considered to be appropriate, either on its own or in combination with other mechanisms.

The mechanism is considered no to be appropriate Y Yes:the mechanism is considered to be appropriate, either on its own or in combination with other mechanisms.

Security ALGORITHMS (Ex.1)

Ciphertext Ciphertext

ENCRYPT DECRYPT

Plaintext

Secret Knowledge Plaintext

K1 K2

(11)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 21

Security ALGORITHMS (Ex.2)

Key Key Symmetric

Key K1=K2 Asymmetric

Key K1≠K2

Typical Examples Typical Examples

DES (1975) IDEA (1987)

El-Gamal (1985) RSA (1985)

Block length: 64, Key length : 56 bits Block Cipher

Block length: 64, Key length : 64 bits Block Cipher

Public Key Cipher

Block and Key length variable

Cryptographic System (1)

C C

E D M M

M M

K1 K2

(12)

2002-08-14 CNSLCNSL-CNSLCNSL---InternetInternetInternet-Internet---DongseoUniv.DongseoUniv.DongseoUniv.DongseoUniv. 23

Cryptographic System (2)

E= Encryption Function D= Decryption Function M= Message

C= Ciphertext K1= Encryption Key K2= Decryption Key

Encryption C = E(M,K1)

Decryption M = D(C,K2)

Referensi

Dokumen terkait

 IP Security can protect any protocol that runs over IP and on any medium that IPs can use, so IPsec is a common method that can provide secure communications over

Keywords: Botnet, DNS, DDoS, Information Entropy, NetFlow, Network Anomaly Detection, Network Security Threats, Traffic Correlation.. DETECTING NEW NETWORK

Motivated by the recent development of map-based graphical password schemes, we conducted a two-phase user study with 60 participants to investigate the issue of multiple

Forward-secure mechanisms aim at preserving the security of past periods’ keys when a private key is compromised. The notion of forward-secure signa- tures, suggested in [3],

A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication 53 http://dx.doi.org/10.5772/intechopen.76685 Author Biometric Data collection Parameter

In this paper, we examine the test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire HAIS-Q and report on the appropriateness of

Cryptanalysis of Symmetric Key Ciphers Linear Cryptanalysis Differential Cryptanalysis Other Cryptanalytic Techniques Overview on S-Box Design Principles Modes of operation of

Message Digest Both public and private key cryptography provide message integrity checks through checksums, but its not a reliable method since encryption of messages is done usually