Professional Documents
Culture Documents
• Message modification: Even when an adversary cannot decode the contents of an infor-
mation transfer nothing prevents her from modifying the message resulting in a incorrect
message being delivered to the destination. A scheme which can detect message modifica-
tions is said to provide data integrity.
• Replay attack : A replay attack occurs when an adversary copies the information sent by
the source to the destination and resends it to produce harmful consequences. A scheme
which prevents replay attacks is said to provide originality.
• Delaying tactics: An adversary can also cause harm by intercepting an information transfer
from a source and sending it to the destination after a some delay. This does not violate
originality but can still have unintended consequences. A scheme which detects delaying
tactics is said to provide timeliness.
• Repudiation or bogus denial: Sometimes a source or a destination can deny that a commu-
nication which actually occurred never took place. A scheme which prevents such bogus
denials is said to provide nonrepudiation.
In this course, we will discuss (if time permits) the major security schemes used on the Internet
today.
• Understand the functioning of existing networks like the Internet, 802.11 WLAN and
Ethernet.
13