Professional Documents
Culture Documents
UNIT – I
Part I
Unit 1
Computer Security Concepts- OSI security Architecture,
A Security attacks, Services, mechanism, model of network
security
Classical encryption techniques- Substitution Cipher
B (Mono-alphabetic, Poly-alphabetic), Transposition cipher,
Steganography
Block Cipher- Encryption Principles, DES & strength of
C DES
Faculty Name : Dr. Amrita 1
Security
Alice Bob
channel data, control
messages
Trudy
Eavesdropper
Attack on Availability
● Destroy hardware (cutting fiber) or software
● Modify software in a subtle way (alias commands) A B
● Corrupt packets in transit
● denial of service (DoS):
– Crashing the server
– Overwhelm the server (use up its resource)
1.1 Encipherment
The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an
algorithm and zero or more encryption keys
1.2 Digital signature
Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and protect
against forgery
1.3 Access control
A variety of mechanisms that enforce access rights to resources
1.4 Data integrity
A variety of mechanisms used to assure the integrity of a data unit or stream of data
units
● Basic tasks
– Design an algorithm that opponent cannot defeat
– Generate the secret information to be used with the algorithm
– Develop methods for distributing secret information
– Specify a protocol to be used
● May need a trusted third part to assist
● Specification
– A statement of desired functions
● Design
– A translation of specifications to a set of components
● Implementation
– Realization of a system that satisfies the design
● Assurance
– The process to insure that the above steps are carried out correctly
– Inspections, proofs, testing, etc.