Professional Documents
Culture Documents
Cryptography Notes
Cryptography Notes
Ioana Sandu
Week 1:
Computer Security Prevention and detection of:
unauthorised actions
authorised actions
Network Security Consists of:
provisions made in an underlying computer
network infrastructure
policies adopted by the network administrator
the network-accessible resources from
unauthorised access
effectiveness of all measures combined
Information Security (=protecting inf. and inf. Deals with:
systems from unauthorised access, use disclosure, information independent of computer systems
disruption, modification, or destruction) Inf. is more general than data
Constitutes a basic right
Steganography Code
(hidden) (replace words)
Secret Substitution
writing Cipher
(replace letters)
Cryptography
(encrypted)
Transposition
Agents (principals):
Honest Agents Agents communicating with each other
Security Properties:
Integrity We are concerned with preventing the possibly
- data has not been (maliciously) altered malicious alteration of data by smn who is not
authorised to do so
In this sense, it can be characterised as the
unauthorised writing of data. This presumes a
security policy saying who or what is allowed to
alter the data
Example violation: an on-line payment system
alters an electronic payment to read £ 10,000
instead of £ 100
Methods of Authentication:
Something you have an entry card
Something you know a password or secret key
Something you are a fingerprint, signature, biometric