chap 7 security Flashcards
Network Security
the practices and technologies used to protect a computer network and its components from unauthorized access, use, disclosure, disruption, modification, or destruction.
safeguard against threats that could compromise the integrity, confidentiality, and availability of a network.
Components/Objectives of Network Security
Confidentiality: Ensures only the sender and intended receiver should “understand” message contents.
Authentication: Sender and receiver want to confirm each other’s identity.
Message integrity: Sender and receiver want to ensure the message has not been altered
Access and availability: Services must be accessible and available to users.
Accountability: Holding individuals, organizations, or entities responsible for their failures related to security incidents, within a networked environment
Key Security Objectives
Confidentiality: Only authorized users access sensitive information.
◦
Integrity: Data and system resources remain unaltered and trustworthy.
◦
Availability: Authorized users can access the network and its resources when needed
Classes of Threats in Computer Networks
- Disclosure:
- Deception:
- Disruption:
- Usurpation:
Disclosure:
Snooping. (Relates to Eavesdropping - intercepting messages).
Deception
- Modification,
- spoofing (impersonation),
- repudiation of origin,
- denial of receipt. (Relates to Actively inserting messages,
- Hijacking - taking over a connection).
Disruption:
Modification. (Relates to Denial of service - preventing service use by overloading resources).
Usurpation:
- Modification,
- spoofing,
- delay,
- denial of service.
Cryptography
- tool for achieving confidentiality, integrity, authentication, non-repudiation, and digital signatures.
- Involves creating ciphers (encryption) and cryptanalysis (breaking ciphers).
Cryptosystems
- frameworks used to encrypt and decrypt data for secure communication and information protection.
- Rely on cryptographic algorithms, keys, and protocols.
- Can be categorized based on the type of cryptographic keys used:
**Secret Key **(single key, symmetric key)
**Public Key **(two key, asymmetric key)
Types of Cryptographic Keys
Secret Key: Used in Symmetric-key cryptography where the same key is used for encryption and decryption.
Public Key: Used in Public Key Cryptosystems which utilize a pair of mathematically linked keys: a public key and a private key. Both secret key and public key systems are in use and competing
Encryption Algorithm
- Used to make content unreadable by all but the intended receivers.
- Applies a key to plaintext to transform it into ciphertext.
- decryption algorithm, uses the key to transform ciphertext back into plaintext.
- algorithm is typically public, but the key is private.
- Can be Block Ciphers (operate on fixed-size blocks)
- Stream Ciphers (operate on a stream of input)
Breaking an Encryption Scheme (Ciphertext-only attack)
The attacker only has access to the encrypted message (ciphertext).
*
Challenge: This is the most challenging scenario for an attacker.
*
Knowns to Cryptanalyst: Encryption algorithm and the ciphertext to be decoded.
Breaking an Encryption Scheme (Chosen-plaintext attack)
Scenario: The attacker can encrypt messages of their choice and obtain the resulting ciphertext.
*
Benefit: Can help the attacker learn about the algorithm’s behavior and potentially exploit vulnerabilities.
*
Knowns to Cryptanalyst: Encryption algorithm, the ciphertext to be decoded, and plaintext messages chosen by the cryptanalyst along with their corresponding ciphertext generated with the secret key
Breaking an Encryption Scheme (Known-plaintext attack)
Scenario: The attacker has some plaintext messages and their corresponding ciphertext.
*
Benefit: This additional information can potentially reveal weaknesses in the algorithm.
*
Knowns to Cryptanalyst: Encryption algorithm, the ciphertext to be decoded, and one or more plaintext-ciphertext pairs formed with the secret key
Breaking an Encryption Scheme (Chosen-ciphertext attack)
*
Scenario: The attacker can modify the ciphertext and obtain the corresponding decrypted plaintext.
*
Power: This is a very powerful attack and can be devastating for some encryption schemes.
*
Knowns to Cryptanalyst: Encryption algorithm, the ciphertext to be decoded, and purported ciphertext chosen by the cryptanalyst along with its corresponding decrypted plaintext generated with the secret key. (Note: Source also lists “Chosen text” which combines chosen plaintext and chosen ciphertext capabilities).
Brute-force attack (Common Cryptanalysis Technique)
Method: Systematically tries all possible keys until the correct one is found.
*
Effectiveness: Can be effective for weak algorithms or short keys.
*
Limitation: Becomes computationally infeasible for strong encryption with large key sizes.
Mathematical cryptanalysis (Common Cryptanalysis Technique)
Method: Exploiting weaknesses in the mathematical foundation of the encryption algorithm.
*
Requirements: Often involves advanced mathematical techniques and deep understanding of the algorithm’s structure
Symmetric-key cryptography
- type of encryption that uses a single secret key for both encryption and decryption.
- ex: secret padlock key that both locks and unlocks the same padlock.
- secret key is a string of bits that scrambles plaintext into ciphertext and vice versa
Symmetric-key cryptography working
- secret key is generated by the sender and securely shared with the intended recipient via a secure channel.
- sender applies the secret key to the plaintext using an encryption algorithm, transforming it into ciphertext.
- recipient, possessing the same secret key, applies it to the ciphertext using a decryption algorithm, reversing the process to recover the original plaintext.
Substitution cipher
A simple encryption scheme where one thing is substituted for another.
*
Example: Monoalphabetic cipher substitutes one letter for another
Encryption key (in substitution cipher example)
In the context of a monoalphabetic substitution cipher, the encryption key is the mapping from the original set of letters to the substituted set of letters.
Advantages of Symmetric-Key Cryptography
- Speed and Efficiency:
- Simplicity:
- Maturity:
Disadvantages of Symmetric-Key Cryptography
- Key Distribution Challenge: Securely distributing the shared secret key is complex
- **Key Management Overhead: **Managing key lifecycle requires planning and secure practices.
* Scalability Limitations: As the number of parties increases, managing and distributing keys becomes complex. - Limited Authentication: Typically only provides encryption/decryption and does not inherently provide authentication of parties.