Concepts Flashcards
Security
Possibility of protecting information, stored or being transmitted on a network.
Parties must be sure a set of requirements was met.
Objectives to met to ensure Security
ACIAN
- Authenticity (Entity Authentication/Identification)
- Confidentiality (Privacy)
- Integrity
- Availability
- Non repudiation
Authenticity
An entity should be correctly identified
Confidentiality/Secrecy
- Information should only be accessed by authorized entities
- (Privacy) Individuals control what information can be collected and stored and to whom it may be disclosed.
Availability
Information should be available/usable by authorized users.
Non-repudiation
An entity should not be able to deny an event.
Accountability
Tracing back an action to an entity
Typical attacks
Passive:
- Eavesdropping (Interception) -> Confidentiality
Active:
- Interruption -> Availability + System integrity
- Modification -> System integrity + Confidentiality
- Forging -> System integrity + Authenticity, Accountability
Classical Cryptography Ciphers/Cryptosystem
Monoalphabetic:
- Caesar Cipher
- Shift Cipher
- Substitution Cipher
- Affine Cipher
Polyalphabetic:
- Vigenère
- Hill Cipher
- Permutation/Transposition Cipher
Vulnerable to:
- Cryptanalysis
- Brute-force attack
Cipher or Cryptosystem
5-tuple consisting of (P,C,K,E,D)
- P: Set of plaintexts
- C: Set of ciphertexts
- K: Set of keys
- E: k x P -> C, encryption function
- D: k x C -> P, decryption function
A cryptosystem is of practical use if…
- Each encryption function and each decryption function should be efficiently computable
- An opponent, upon seeing a ciphertext string y, should be unable to determine the key K that was used, or the plaintext string x.
Kerchkoff’s principle is…
- A cipher should remain secure even if the algorithm becomes public
- The system should be, in practice, unbreakable
Attacks to Shift Ciphers
Brute force on the key space (26 keys)
Relation between classical ciphers
- Caesar cipher is a subcase of Shift cipher with k = 3
- Shift cipher is a subcase of Substitution cipher where only 1 permutation is used the alphabetically ordered one
- Shift cipher is a subcase of Affine cipher where a equals 1
- Permutation/Transposition Cipher is a subcase of Hill Cipher where the K matrix is a modified identity matrix which does the transposition of places
Attacks to Substitution Cipher
As it is a monoalphabetic cipher, statistical reconstruction of keys can be used to decrypt messages.
Making replacements and guesses on single characters, digrams and trigraphs