Network Security:
Network security is an important field that is increasingly gaining attention as the internet expands. The field of network security consists of measures to detect, prevent and correct security violations that involve the transmission of information. Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could modify or forge your data, either for amusement or for their own benefit.
In simple terms, network security is securing the network. Network security protects your network and data from breaches, intrusions and other threats. It is the process of taking preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Implementing these measures allows computers, users and programs to perform their permitted critical functions within a secure environment.
Network security is the operation of protecting data, applications, devices, and systems that are connected to the network. Different policies and practices adopted to prevent any unauthorized access or misuse of computer networks and related resources are called network security. Also, it monitors the modifications made or the delay in the network used.
It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
Network security entails protecting the usability, reliability, integrity, and safety of network and data. Effective network security defeats a variety of threats from entering or spreading on a network. The primary goal of network security are: Confidentiality, Integrity, and Availability.
Network security is a category of practices and technologies that keep internal networks protected from attacks and data breaches. It encompasses access control, cyber attack prevention, malware detection, and other security measures. An effective network security plan is developed with the understanding of security issues, potential attackers, needed level of security, and factors that make a network vulnerable to attack
Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re‐insert a false message. Securing the network is just as important as securing the computers and encrypting the message.
Network security is an organization’s strategy that guarantees the security of its assets, including all network traffic. It includes both software and hardware technologies. Access to the network is managed by adequate network security, which targets many threats and then arrests them from spreading or entering the network.
Role of Network Security:
The Role of network security includes the following:
- Prevent unauthorized access or misuse of computer networks and data.
- Protect network data, infrastructure, and all traffic from external threats.
- Stop threats from spreading through the system.
- Enable secure data sharing between systems and employees.
- Grant users adequate access to resources.
- Detect and respond to suspicious user behavior and software anomalies.
- Scanning the network for viruses, Trojans, and other malicious software.
- Creating new rules to protect against malware infections.
- Monitoring the network for suspicious activity such as suspicious email attachments or suspicious website behaviour.
Need for Network Security:
The use of the Internet has increased drastically, as we are moving even our day-to-day activities towards complete digitalization. Due to the increase in the use of the Internet, hackers and attackers also become more active and our networking system tends to have a higher number of virus attacks.
Basically, the need for network security is to perform two tasks mainly, the first is to secure the information from any unauthorized access and the second is to provide the security to the data stored on PC or laptops not only for an individual network but also on the shared or public domain networks.
Network security is one of the most important aspects to consider when working over the internet. A stable and efficient network security system is essential to protecting client data. A good network security system helps business reduce the risk of falling victim of data theft and sabotage. Network security helps protect your workstations from harmful spyware. It also ensures that shared data is kept secure.
Network security ultimately protects the recognition of your organization. With hackers increasing and becoming smarter day by day, the need to utilize network security tools becomes more and more important.
Benefits of Network Security/ Importance of Network security:
Unless it’s properly secured, any network is vulnerable to malicious use and accidental damage. Hackers, disgruntled employees, or poor security practices within the organization can leave private data exposed, including trade secrets and customers’ private details.
The majority of common attacks against networks are designed to gain access to information, by spying on the communications and data of users, rather than to damage the network itself. But attackers can do more than steal data. They may be able to damage users’ devices or manipulate systems to gain physical access to facilities. This leaves the organization’s property and members at risk of harm.
Competent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals. More than that, it means that clients and partners can also interact with the organization confidently.
Network security tools and devices exist to help your organization protect not only its sensitive information but also its overall performance, reputation and even its ability to stay in business. Continued operational ability and an intact reputation are two key benefits of effective network security.
Secure and reliable networks protect not just organizational interests and operations, but also any client or customer who exchanges information with the organization, in addition to the general public. A well designed network security solution reduces overhead expenses and safeguards organizations from costly losses that occur from a data breach or other security incident.
Here’s why both businesses and households should consider the security of their networks seriously:
· To protect the computers in the network: Computers and other devices connected to unsecured networks are highly vulnerable to external threats such as malware, ransomware and spyware attacks. A single attack can bring down the entire computer system of an organization and compromise your personal information. By assuring the security of the network – typically with the assistance of a network security specialist – you can stay away from such expensive threats.
· To prevent identity theft: No matter whether you are an organization or an individual, your identity is valuable. If you log into an unsecured network, your identity can become visible to third-parties. To avoid such a situation, you should secure your network. Such an approach becomes mandatory if you are a business that deals with client information.
· To protect shared data: When it comes to a business, special precautions should be taken to protect shared data. And, network security is one of the best ways to do so. Network security can be applied with different restrictions on different computers depending on the types of files they handle.
· To stabilize the network connection: In an unrestricted, unprotected network, network activity can become too heavy. Intense traffic can lead to an unstable computer network. Eventually, the entire network will become vulnerable to various external attacks.
Goals of Network security or Objectives of Network Security:
Network security is the process through which a network is secured against internal and external threats of various forms. Network security is not only concerned about the security of the computers at each end of the communication chain; however, it aims to ensure that the entire network is secure.
Network security necessitates protecting the usability, stability, honesty, and security of network and also data. It aims to guarantee that the whole system is secure.
Network security entails protecting the usability, reliability, integrity, and safety of network and data. Effective network security defeats a variety of threats from entering or spreading on a network.
The primary goals of network security are Confidentiality, Integrity, and Availability. These three pillars of Network Security are often represented as CIA triad (CIA triangle).
· Confidentiality: The first goal of Network Security is “Confidentiality”. Confidentiality means preserving authorized restrictions on information access and disclosure. Making sure people cannot attain the information they should not (keeping secrets).
It is the protection of data from unauthorized disclosure. Confidentiality can be defined as permitting approved users for accessing all sensitive as well as protected information. The confidentiality aspect of network security involves keeping the data private.
The function of confidentiality is to protect precious business data from unauthorized persons. Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons. A loss of confidentiality is the unauthorized disclosure of information.
Confidentiality ensures that the information is not read by anyone for whom it was unintended and is read only by authorized parties. All information during the transaction has the request of being kept confidential. Information should not be accessible to unauthorized person. It should not be intercepted during transmission.
· Integrity: The second goal of Network Security is “Integrity”. Integrity means guarding against improper information modification or destruction. Making sure people cannot change the information they should not (protecting data). Integrity aims at maintaining and assuring the accuracy and consistency of data.
The function of integrity is to make sure that the data is accurate and reliable and is not changed by unauthorized persons or hackers. The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data. A loss of integrity is the unauthorized modification or destruction of information.
Integrity ensures that the information wasn’t altered in storage or transit between sender and intended receiver. Information should not be altered during its transmission over the network. The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion or replay). Integration prevents the unauthorized modification of data.
· Availability: The third goal of network security is “Availability”. As the name suggests, availability specifies whether the data or resource is available when required or requested by the client. Making sure people cannot stop the computer from doing its job.
Availability means ensuring timely and reliable access to and use of information. The function of availability in Network Security is to make sure that the data, network resources or network services are continuously available to the legitimate users, whenever they require it. A loss of availability is the disruption of access to or use of information or an information system.
Although the use of CIA triad to define security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:
Authenticity: Authenticity is the property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. Authenticity ensures that the sender and receiver can confirm each others identity and the origin/destination of the information.
Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity. We can verify authenticity through authentication.
Authentication can be defined as the process of ensuring and confirming that the identity of the user is genuine and legitimate. Authentication prevents impersonation and requires users to confirm their identities before being allowed access to systems and resources. This includes user names, passwords, emails, biometrics, and others.
Accountability: Accountability is the principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
It is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
OSI Security Architecture:
OSI (Open System Interconnection) Security Architecture defines the well-planned standard architecture for security features in computer networking.
It is a recommendation of the International Telecommunication Union which defines a systematic approach to define security requirements for a certain organization, as well as approaches to meet the aforementioned requirements.
The OSI security architecture provides a general description of security services and mechanisms, as well as a description of security attacks.
Classification of OSI Security Architecture:
OSI Security Architecture is categorized into three broad categories:
Security Attack: Any action that compromises the security of information owned by an organization.
Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
Security Service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
Security Attacks:
A security attack means any action that puts the data or overall security of the system at risk. An attack might be successful or unsuccessful. In case of a successful attack, the attacker can complete his/her motive of breaking the security of the system in any way he/she wants to. In case of an unsuccessful attack, the system remains secured and no harm to the security is done.
A useful means of classifying security attacks, used both in X.800 and RFC 4949, is in terms of passive attacks and active attacks.
Passive Attacks:
In passive network attacks, attackers gain unauthorized access to a network and can monitor or steal sensitive information, without making any alterations.
In passive attack a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose of a passive attack is to gain information about the system being targeted; it does not involve any direct action on the target. The attacker does not modify or corrupt the data. No changes are made to the data.
A Passive attack attempts to learn or make use of information from the system but does not affect system resources. There are 2 types of passive attacks.
· Release of message content
· Traffic analysis
Release of message content: Telephonic conversation, an electronic mail message, or a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.
Traffic Analysis: As the name suggests, this attack focuses on the amount or volume of data sent between the sender and the reciever .The attacker can predict a lot of information about the sender and the receiver by knowing the amount of data sent. For example, if a lot of data is being sent from the sender to the receiver, it is assumed as there is an emergency, or a task is happening on an urgent basis. If less data is shared between the sender and the receiver, it is assumed that there is a lack of communication and so on.
Suppose that we had a way of masking (encryption) information, so that the attacker even if captured the message could not extract any information from the message.
The opponent could determine the location and identity of communicating host and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place.
Active Attacks:
In active attacks attackers not only gain unauthorized access but also modify data either deleting, encrypting or otherwise harming it. Attackers gain unauthorized access to the network and then modify data (say, via encryption) to compromise it and affect its usability and value.
An Active attack attempts to alter system resources or affect their operations. Active attacks involve some modification of the data stream or the creation of false statements. Active attacks are subdivided into four categories.
· Masquerade
· Replay
· Modification of messages
· Denial of Service
Masquerade: A masquerade attack takes place when one entity pretends to be a different entity. In this attack too, the attacker acts to be an authorized user. A Masquerade attack involves one of the other forms of active attacks. If an authorization procedure isn’t always absolutely protected, it is able to grow to be extraordinarily liable to a masquerade assault. Masquerade assaults may be performed using the stolen passwords and logins, with the aid of using finding gaps in programs, or with the aid of using locating a manner across the authentication process.
Modification of messages: It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect. Modification is an attack on the integrity of the original data. It basically means that unauthorized parties not only gain access to data but also spoof the data by triggering denial-of-service attacks, such as altering transmitted data packets or flooding the network with fake data.
Replay: It involves the passive capture of a message and its subsequent transmission to produce an authorized effect. In this attack, the basic aim of the attacker is to save a copy of the data originally present on that particular network and later on use this data for personal uses. Once the data is corrupted or leaked it is insecure and unsafe for the users.
Denial of Service: The denial-of-service (DoS) attack is an attack in which a system is attacked by a lot of requests to the system at one time that it is not able to handle. The attacker sends multiple requests to the server at the same time and the server is not able to handle such requests. However, this attack is easily identifiable as these loads of requests come from a single sender (the attacker) and it is easy to identify the source of the attack.
It prevents the normal use of communication facilities. This attack may have a specific target. For example, an entity may suppress all messages directed to a particular destination. Another form of service denial is the disruption of an entire network either by disabling the network or by overloading it with messages so as to degrade performance.
Denial of service is a method used by hackers to send a large number of automated requests to a website. To the website server, these requests seem to originate from genuine visitors. So the website server attempts to respond to the requests. But the sheer volume overwhelms the server. Although a DoS attack does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems.
Security Services:
X.800 defines a security service as a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems of data transfers.
RFC 4949 defines a security service as a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented by security mechanism.
Security service is a processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. These are the services that are used for maintaining security. These security services can be implemented in various layers of the OSI model.
X.800 divides security services into 5 categories and 14 specific services.
Authentication:
The authentication service is concerned with assuring that a communication is authentic. Authentication is the assurance that the communicating entity is the one that it claims to be.
In the case of a single message, such as a warning or alarm signal, the function of the authentication service is to assure the recipient that the message is from the source that it claims to be from.
In the case of an ongoing interaction, such as the connection of a terminal to a host, two aspects are involved. First, at the time of connection initiation, the service assures that the two entities are authentic, that is, that each is the entity that it claims to be. Second, the service must assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception.
Two specific authentication services are defined in X.800:
Peer Entity Authentication: Provides for the corroboration of the identity of a peer entity in an association. It attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection.
Peer entity authentication used in association with a logical connection to provide confidence in the identity of the entities connected. It is the process of verifying that a peer entity in an association is as claimed.
Peer entity authentication means verifying the identity of one entity by another.
Data Origin Authentication: Provides for the corroboration of the source of a data unit. In a connectionless transfer, provides assurance that the source of received data is as claimed.
Data origin authentication means verifying the origin of received data. It does not provide protection against the duplication or modification of data units. This type of service supports applications like electronic mail, where there are no prior interactions between the communicating entities.
Access Control:
The prevention of unauthorized use of a resource i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do.
In the context of network security, access control is the ability to limit and control the access to host systems and applications via communications links.
In an organization, various levels of employees have various levels of access to the system. For example, in a company, a software engineer has limited access to the system as compared to the product manager and the product manager has limited access as compared to the CTO of the company.
Data Confidentiality:
This is one of the three pillars of the security model CIA (Confidentiality, Integrity, and Availability). Confidentiality means that the data shared between a sender and receiver should be confidential to them only. No third party should be able to read the data. Confidentiality is the protection of data from unauthorized disclosure. When preventing disclosure of information to unauthorized parties is needed, the property of confidentiality is required.
To provide confidentiality, the cryptographic algorithm and mode of operation needs to be designed and implemented in such a way that an unauthorized party will be unable to determine the keys that have been associated with the encryption or have the ability to derive the information without using the correct keys.
Confidentiality is the protection of transmitted data from passive attacks. With respect to the content of a data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period of time. For example, when a TCP connection is set up between two systems, this broad protection prevents the release of any user data transmitted over the TCP connection. Narrower forms of this service can also be defined, including the protection of a single message or even specific fields within a message. The other aspect of confidentiality is the protection of traffic flow from analysis. This requires that an attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility.
Connection Confidentiality: The protection of all user data on a connection.
Connectionless Confidentiality: The protection of all user data in a single data block
Selective-Field Confidentiality: The confidentiality of selected fields within the user Data on a connection or in a single data block.
Traffic Flow Confidentiality: The protection of the information that might be derived from observation of traffic flows.
Data Integrity:
This is the second pillar of the CIA. Here, integrity means that no third party should be able to modify the data shared between the sender and the receiver.
Data integrity is the assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay).
As with confidentiality, integrity can apply to a stream of messages, a single message, or selected fields within a message. Again, the most useful and straightforward approach is total stream protection.
A connection-oriented integrity service, one that deals with a stream of messages, assures that messages are received as sent with no duplication, insertion, modification, reordering, or replays. The destruction of data is also covered under this service. Thus, the connection-oriented integrity service addresses both message stream modification and denial of service. On the other hand, a connectionless integrity service, one that deals with individual messages without regard to any larger context, generally provides protection against message modification only. We can make a distinction between service with and without recovery.
Because the integrity service relates to active attacks, we are concerned with detection rather than prevention. If a violation of integrity is detected, then the service may simply report this violation, and some other portion of software or human intervention is required to recover from the violation. Alternatively, there are mechanisms available to recover from the loss of integrity of data, as we will review subsequently. The incorporation of automated recovery mechanisms is, in general, the more attractive alternative
Connection Integrity with Recovery: Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted.
Connection Integrity without Recovery: As above, but provides only detection without recovery.
Selective-Field Connection Integrity: Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.
Connectionless Integrity: Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided.
Selective-Field Connectionless Integrity: Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified.
Non- Repudiation:
Non-repudiation provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. It prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender.
Non-Repudiation ensures that the sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information.
Non-repudiation, Origin: Proof that the message was sent by the specified party.
Non-repudiation, Destination: Proof that the message was received by the specified party.
Security Mechanisms:
Security mechanisms are technical tools and techniques that are used to implement security services. The security mechanisms provide a way of preventing, protecting and detecting attacks.
Security mechanism is designed to detect, prevent, or recover from a security attack. The mechanisms that help in setting up the security services in different layers of the OSI model and that help in identifying any attack or data breach are called security mechanisms.
Security mechanisms are the specific means of implementing one or more security services. The mechanisms are divided into those that are implemented in a specific protocol layer and those that are not specific to any particular protocol layer or security service.
The security mechanisms defined in X.800 are explained below:
Specific Security Mechanisms:
Specific security mechanisms may be incorporated into the appropriate protocol layer in order to provide some of the security services.
The OSI security architecture enumerates eight specific security mechanisms.
Encipherment: This security mechanism deals with hiding and covering of data which helps data to become confidential. It is achieved by applying mathematical calculations or algorithms which reconstruct information into not readable form.
One of the most popular security mechanisms is encryption. The message/data sent from the sender to the receiver is usually encrypted to some format that even if the message is stolen, cannot be decrypted easily by the attacker. Some of the popular encryption algorithms are AES, RSA, Triple DES, etc.
Digital Signature: A digital signature is an analytical approach which validates the authenticity and integrity of a message, application or digital records. It allows us to test the author name, date and time of signatures, and verify the message text.
The digital signature supports far more basic security and designed to solve the problem of tampering and impersonation (deliberately copy another person’s features) in electronic connection.
Data or cryptographic transformation of an information unit is additional to the data, therefore that the recipient of the information unit is converted of the source and integrity of the information unit and this can also serve to secure the data against forgery (such as by the recipient).
Access Control: Access control is an information security process that enables organizations to manage who is authorized to access corporate data and resources.
Secure access control need policies that check users are who they claim to be and support proper control access levels are allowed to users. There are several structure are available that accomplish access rights to resources.
This mechanism is used to stop unattended access to data which you are sending. It can be achieved by various techniques such as applying passwords, using firewall, or just by adding PIN to data.
Data Integrity: Integrity can use to a flow of messages, an individual message, or selected areas inside a message. In data integrity, it is a connection-oriented integrity service, it can handle with a flow of messages, and assure that messages are received as sent with no duplication, insertion, modification, reordering, or replays.
Authentication Exchange: A mechanism intended to ensure the identity of an entity by means of information exchange. Such a mechanism consists of an exchange of messages between a pair of entities.
This security mechanism deals with identity to be known in communication. This is achieved at the TCP/IP layer where two-way handshaking mechanism is used to ensure data is sent or not.
Traffic Padding: Traffic padding mechanisms are used to protect against traffic analysis attacks.
The sender and receiver send the data to each other. Now, sometimes there is a gap between the sender and receiver. This means that for some time when the sender and receiver are not sharing the data, the attacker can act as if it is the sender and send some data to the receiver to attack it. So, this can be avoided if the gap (empty time) between the sender and the receiver is not known to the attacker. For this, during the gap duration, the sender keeps on sending some dummy data to the receiver and the receiver knows that this is the dummy data by using some identification. Hence, no gap is created between the sender and the receiver and the attacker cannot attack the system.
Routing Control: Routing control enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected.
The messages that a sender sends to a receiver travel different routes, however, in some cases, the sender and receiver might communicate mostly via the same route. In this case, the attacker tracks this route and can make changes to the data or take advantage of this. So, routing should be controlled in such a way that mostly, a different route is selected between the sender and the receiver to deliver the message.
Notarization: Notarization is the usage of a trusted third party to assure certain properties of a data exchange.
This security mechanism involves use of trusted third party in communication. It acts as mediator between sender and receiver so that if any chance of conflict is reduced. This mediator keeps record of requests made by sender to receiver for later denied.
Notarization mechanisms can be used to assure certain properties of the data communicated between two or more entities, such as its integrity, origin, time, or destination. The assurance is provided by a trusted third party (TTP) in a testifiable manner.
Pervasive Security Mechanisms:
Pervasive security mechanisms are not specific to any particular security service. The OSI security architecture enumerates five pervasive security mechanisms.
Trusted Functionality: Trusted functionality is the process which is perceived to be correct with respect to some criteria (e.g., as established by a security policy).
The general concept of trusted functionality can be used to either extend the scope or to establish the effectiveness of other security mechanisms. Any functionality that directly provides, or provides access to, security mechanisms should be trustworthy.
Security Label: This is an approach of marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource.
System resources may have security labels associated with them, for example, to indicate sensitivity levels. It is often necessary to convey the appropriate security label with data in transit. A security label may be additional data associated with the data transferred or may be implicit (e.g., implied by the use of a specific key to encipher data or implied by the context of the data such as the source address or route).
Event Detection: Detection of security-relevant events including forgery, denial of sending or receiving of information, modification of information etc.
Security Audit Trail: A security audit refers to an independent review and examination of system records and activities to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy, and procedures. Consequently, a security audit trail refers to data collected and potentially used to facilitate a security audit.
It supports a valuable security mechanism, as possibly they allow detection and analysis of breaches of security by allowing a subsequent security audit. A security audit is an independent report and investigation of system data and events in order to test for sufficiency of system controls, to provide compliance with established policy and operational processes, to help in loss assessment and to approve some indicated changes in controls, policy and processes.
Security Recovery: Security recovery deals with requests from mechanisms such as event handling and management functions, and takes recovery actions as the result of applying a set of rules.
Relationship between Security Services and Mechanisms:
Security services and mechanisms are closely related because a mechanism or combinations of mechanisms are used to provide a service.
Security mechanisms are technical tools and techniques that are used to implement security services. A mechanism might operate by itself, or with others, to provide a particular service.
Service |
Mechanism |
|||||||
|
Encipherment (Encryption) |
Digital signature |
Access control |
Data integrity |
Authentication exchange |
Traffic padding |
Routing Control |
Notarization |
Peer entity authentication |
Y |
Y |
|
|
Y |
|
|
|
Data origin authentication |
Y |
Y |
|
|
|
|
|
|
Access control |
|
|
Y |
|
|
|
|
|
Confidentiality |
Y |
|
|
|
|
|
Y |
|
Traffic flow confidentiality |
Y |
|
|
|
|
Y |
Y |
|
Data integrity |
Y |
Y |
|
Y |
|
|
|
|
Nonrepudiation |
|
Y |
|
Y |
|
|
|
Y |
Availability |
|
|
|
Y |
Y |
|
|
|
Some basic terminology of cryptography…
Plain Text: An original message is known as the plain text. It is the actual message that both sender and receiver can understand also by anyone else who gets an access to that message.
Cipher text: The coded message is called the ciphertext. When any plain text is codified using a suitable scheme and the resulting message is cipher text.
Encryption: The process of converting plaintext into ciphertext is known as enciphering or encryption.
Decryption: Restoring the plaintext from the cyphertext is known as deciphering or decryption.
Cryptography: The art and science to achieve security by encoding messages to make them unreadable are known as Cryptography.
Cryptanalysis: The technique to decode an unreadable code to readable again without knowing how they were initially converted from readable to unreadable is Cryptanalysis.
Cryptology: The areas of cryptography and cryptanalysis together are called cryptology
Thus, Cryptology = Cryptography + Cryptanalysis.
Cryptography:
Cryptography is a technique of secret writing. It is the process of hiding or coding information so that only the person a message was intended for can read it. A common cryptography definition is the practice of coding information to ensure only the person that a message was written for can read and process the information. Cryptography is the art of keeping information secure by transforming it into form that unintended recipients cannot understand.
Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what’s known as ciphertext and then back again upon arrival.
Cryptography not only protects data from theft or alteration, but can also be used for user authentication. It is used in many applications like banking transactions cards, computer passwords, and e- commerce transactions.
The main objectives of cryptography are:
Confidentiality: To ensure that the information is not read by anyone for whom it was unintended and is read only by authorized parties.
Integrity: To ensure that the information wasn’t altered in storage or transit between sender and intended receiver.
Non-repudiation: To ensure that the sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information.
Authentication: To ensure that the sender and receiver can confirm each others identity and the origin/destination of the information.
There are two basic types of cryptographic systems:
1. Public Key Cryptography
2. Private Key Cryptography
Public Key Cryptography: Public key cryptography also known as asymmetric cryptography is a class of cryptographic system that uses two keys- a public key and a private key. A public key is known to everyone while private key (or secret key) is known only to the recipient of the message.
With asymmetric crypto, two different keys are used for encryption and decryption. Every user in an asymmetric cryptosystem has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
Private Key Cryptography: Private key cryptography, also known as Symmetric Cryptography or Secret key cryptography is a method in which the same key is used to encrypt and decrypt the message. In private key cryptography, sender and the recipient of the message must agree on a common key via some alternative secure channel. The sender encrypts the plaintext message using the key and sends it to the recipient who then uses the same key to decrypt it and unlock the original plaintext message.
With symmetric cryptography, the same key is used for both encryption and decryption. Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text.
The Importance of Cryptography:
Cryptography remains important to protecting data and users, ensuring confidentiality, and preventing cyber criminals from intercepting sensitive corporate information. Common uses and examples of cryptography include the following:
Privacy and Confidentiality: Individuals and organizations use cryptography on a daily basis to protect their privacy and keep their conversations and data confidential. Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient. A common example of this is the messaging tool WhatsApp, which encrypts conversations between people to ensure they cannot be hacked or intercepted.
Cryptography also secures browsing, such as with virtual private networks (VPNs), which use encrypted tunnels, asymmetric encryption, and public and private shared keys.
Authentication and Integrity: Similar to how cryptography can confirm the authenticity of a message, it can also prove the integrity of the information being sent and received. Cryptography ensures information is not altered while in storage or during transit between the sender and the intended recipient. For example, digital signatures can detect forgery or tampering in software distribution and financial transactions.
Non-repudiation: Cryptography confirms accountability and responsibility from the sender of a message, which means they cannot later deny their intentions when they created or transmitted information. Digital signatures are a good example of this, as they ensure a sender cannot claim a message, contract, or document they created to be fraudulent. Furthermore, in email non-repudiation, email tracking makes sure the sender cannot deny sending a message and a recipient cannot deny receiving it.
Cryptanalysis and Brute-Force Attack:
Typically, the objective of attacking an encryption system is to recover the key in use rather than simply to recover the plaintext of a single ciphertext. There are two general approaches to attacking a conventional encryption scheme:
Cryptanalysis:
Cryptanalysis is the science of recovering plaintext of the message without having access to the key. It is a technique of converting ciphertext to plaintext. It’s also known as cracking codes. The main objective of cryptanalysis is to discover weaknesses in or otherwise defeat encryption algorithms.
Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. It uses mathematical formulas to search for algorithm vulnerabilities and break into cryptography or information security systems. Cryptanalysis also termed code-cracking, is the in-depth understanding of several methods in order to decode and decrypt the encrypted information and data, without any access to the confidential information.
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is typically required to do so. Typically, this involves knowing how the system works and finding a secret key. Cryptanalysis is also referred to as codebreaking or cracking the code. The ciphertext is generally the easiest part of a cryptosystem to obtain and, therefore, is an important part of cryptanalysis. Depending on what information is available and what type of cipher is being analyzed, cryptanalysts can follow one or more attack models to crack a cipher.
Various Cryptanalysis Attacks:
Cryptanalytic attacks rely on the nature of the algorithm plus some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs.
There are 5 types of cryptanalytic attacks, and all of them are given below :
Ciphertext Only attacks: Attacker uses known ciphertext collections. In this attack, the attacker only has some ciphertext and attempts to decrypt the encryption key and plaintext using only the ciphertext. It is considered that attacker understand the algorithm and can intercept the ciphertext.
This type of attack is conceivable when the attacker just has access to some ciphertext and is attempting to decipher the encryption key and plaintext.
In this sort of attack, the attacker only has some ciphertext and attempts to decrypt the encryption key and plaintext using only the ciphertext. The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
Known Plaintext attacks: In this type of attack, the analyst may be able to capture one or more plaintext messages as well as their encryptions. Or the analyst may know that certain plaintext patterns will appear in a message.
The cryptanalyst understand some plaintext pairs that have been collected earlier, moreover the intercepted ciphertext that it wants to break. In this case the attacker is aware of plaintext-ciphertext pairings. An attacker just needs to map those pairings to find the encryption key. This assault is quite simple since the attacker already has a wealth of information at his disposal.
Some plaintext-ciphertext combinations are previously known in this type of attack. In order to find the encryption key, the attacker maps them. This assault is easy to carry out because a large amount of information is already available.
Chosen Plaintext attacks: The attacker selects random plaintexts, obtains the ciphertexts, and attempts to decrypt the message. Chosen-plaintext attack is same to known-plaintext attack but the plaintext pairs have been selected by the attacker himself. This type of attack is simpler to implement but they are less likely to appear.
This attack is carried out by selecting random plaintexts and then acquiring the ciphertexts that correspond to them. The encryption key must be discovered by the attacker. Though it is comparable to KPA and is reasonably easy to deploy, it has a low success rate.
Chosen Ciphertext attack: The chosen-ciphertext attack is same to the chosen plaintext. In this, the attacker selects some ciphertext and decrypts it to develop a plaintext. This attack is applicable if the attacker has access to the receiver’s computer.
Chosen Text attack: It is the combination of Chosen Plaintext attack and Chosen Ciphertext attack.
Following table summarizes the various types of cryptanalytic attacks based on the amount of information known to the cryptanalyst:
Type of Attack |
Known to Cryptanalyst |
Ciphertext Only |
· Encryption algorithm · Ciphertext
|
Known Plaintext |
· Encryption algorithm · Ciphertext · One or more plaintext-ciphertext pairs formed with the secret key
|
Chosen Plaintext |
· Encryption algorithm · Ciphertext · Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key
|
Chosen Ciphertext |
· Encryption algorithm · Ciphertext · Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key
|
Chosen Text |
· Encryption algorithm · Ciphertext · Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key · Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key
|
Brute-Force Attack:
A brute-force attack involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. On average, half of all possible keys must be tried to achieve success. That is, if there are X different keys, on average an attacker would discover the actual key after X/2 tries. A brute force attack against a cipher consists of breaking a cipher by trying all possible keys.
A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly. The attacker submits combinations of usernames and passwords until they finally guess correctly. During the brute-force attack, the intruder tries all possible keys (or passwords), and checks which one of them returns the correct plaintext. A brute-force attack is also called an exhaustive key search.
These attacks are done by ‘brute force’ meaning they use excessive forceful attempts to try and ‘force’ their way into your private account(s). This is an old attack method, but it’s still effective and popular with hackers.
A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Using brute force is an exhaustive effort rather than employing intellectual strategies.
Difference between Cryptography and Cryptanalysis
Cryptography is used to disguise information, particularly via an unprotected route or transmission method. Most messages, including bank interactions and email correspondence, are now sent via the internet. As a result, message security is essential. This technique converts a plaintext (message to be conveyed) message to a ciphertext message using encryption techniques. Decryption is the process of converting plaintext to ciphertext.
Cryptanalysis is a method of converting ciphertext to plaintext. An unauthorized individual attempts to decode the communication by listening in on the unsecured connection. It is also known as code-breaking. This person is not bound by any rules. He may obtain in any manner.
Traditional Symmetric Ciphers:
There are two ways by which we can primarily change plain text to cipher text. The two basic building blocks of all encryption techniques are:
· Substitution Technique
· Transposition Technique
Substitution Technique:
Substitution Technique is a way of encrypting the message where characters or symbols replace the original plaintext. It is a classical encryption technique where the characters present in the original message are replaced by the other characters or numbers or by symbols. If the plain text (original message) is considered as the string of bits, then the substitution technique would replace bit pattern of plain text with the bit pattern of cipher text.
Some of the substitution techniques which will help us to understand the procedure of converting plain text o cipher text are explained below.
1. Caesar Cipher
2. Monoalphabetic Cipher
3. Playfair Cipher
4. Hill Cipher
5. Polyalphabetic Cipher
6. One-Time Pad
Caesar Cipher
Caesar Cipher is the simplest substitution technique proposed by Julius Caesar. In this technique, each character of the plaintext message will be replaced by another character, symbol or number. To encrypt the plain text, each alphabet of the plain text is replaced by the alphabet three places further it. And to decrypt the cipher text each alphabet of cipher text is replaced by the alphabet three places before it.
Formula is as follows:
Encryption:
Cipher = (plaintext + 3) mod 26
For each plaintext letter p, substi-tute the ciphertext letter C:
C = E(3, p) = (p + 3) mod 26
Decryption:
plaintext = (Cipher – 3) mod 26
The general Caesar algorithm is
C= E(k,P)= (P+k) mod26
where k takes on a value in the range 1 to 25.
The decryption algorithm is simply
P=D(k, C)=(C – k) mod 26
Example:
Plain Text: meet me tomorrow
Cipher Text: phhw ph wrpruurz
We have replaced, ‘m’ with ‘p’ which occur three places after, ‘m’. Similarly, ‘e’ is replaced with ‘h’ which occurs in three places after ‘e’.
Example:
Plain Text: I am studying Data Encryption
Key: 4
Cipher Text: M eq wxyhCmrk Hexe IrgvCtxmsr
If we have to replace the letter ‘z’ then the next three alphabets counted after ‘z’ will be ‘a’ ‘b’ ‘c’. So, while counting further three alphabets if ‘z’ occurs it circularly follows ‘a’.
There are also some drawbacks of this simple substitution technique. If the hacker knows that the Caesar cipher is used then to perform brute force cryptanalysis, he has only to try 25 possible keys to decrypt the plain text.
The hacker is also aware of the encryption and decryption algorithm.
Playfair Cipher:
The playfair cipher is also known as Playfair Square. It is a cryptographic technique used for manual encryption of information. This scheme was developed by Charles Wheatstone in 1854.
The Playfair cipher was used by the British army in World War I and by the Australian in World War II. This was applicable because the playfair cipher is perfectly fast to use and does not demand some specific equipment to be used.
Playfair cipher is a substitution cipher which involves a 5X5 matrix.
Rules for generating ciphertext in Playfair Cipher:
- Firstly, create a 5×5 matrix from given keyword.
- Secondly, create pairs of alphabets, if same letters are there in pair, add ‘x’ in between.
- Thirdly, if pair appears in same row, shift the letter with immediate right letter.
- If pair appears in same column, replace it with the letter below it.
- In case pairs are in different rows and columns, replace it with the letters on corner of same row.
For instance, Keyword: OCCURENCE,
Plaintext: TALL TREES.
Here, resultant pair will be: TA LX LT RE ES.
Keyword matrix is as follows:
O |
C |
U |
R |
E |
N |
A |
B |
D |
F |
G |
H |
I/J |
K |
L |
M |
P |
Q |
S |
T |
V |
W |
X |
Y |
Z |
5×5 matrix in Playfair Cipher:
Hence, here ‘TA’ are in different rows and columns, so replace it by ‘PF’. Thus, ciphertext = PF IZ TZ EO RT
Transposition Technique:
Transposition technique (No replacement of character) is an encryption method which is achieved by performing permutation over the plain text. Mapping plain text into cipher text using transposition technique is called transposition cipher.
The transposition technique is a cryptographic technique that converts the plain text to cipher text by performing permutations on the plain text, i.e., changing each character of plain text for each round. The substitution technique substitutes a plain text symbol with a cipher text symbol. On the other hand, the transposition technique executes permutation on the plain text to obtain the cipher text.
Transposition Techniques Types:
1. Rail Fence Transposition
2. Columnar Transposition
3. Improved Columnar Transposition
Rail-Fence Technique:
Rail-Fence is the simplest transposition technique in which the plaintext is written down as a sequence of diagonals and then reading it row by row to produce the ciphertext.
For example, to encipher the message “meet me tomorrow” with a rail fence of depth 2, we write the following:
m |
|
e |
|
m |
|
t |
|
m |
|
r |
|
o |
|
|
e |
|
t |
|
e |
|
o |
|
o |
|
r |
|
w |
Once you have written the message as a sequence of diagonals, to obtain the cipher text out of it you have to read it as a sequence of rows. So, reading the first row the first half of cipher text will be:
m e m t m r o
reading the second row of the rail fence, we will get the second half of the cipher text:
e t e o o r w
Now, to obtain the complete cipher text combine both the halves of cipher text and the complete cipher text will be:
Cipher Text: M E M T M R O E T E O O R W
Rail fence cipher is easy to implement and even easy for a cryptanalyst to break this technique. So, there was a need for a more complex technique.
Columnar Transposition Technique
A. Basic Technique:
The columnar transposition cipher is more complex as compared to the rail fence. The steps to obtain cipher text using this technique are as follow:
Step 1: The plain text is written in the rectangular matrix of the initially defined size in a row by row pattern.
Step 2: To obtain the cipher text read the text written in a rectangular matrix column by column. But you have to permute the order of column before reading it column by column. The obtained message is the cipher text message.
B. Columnar Transposition Technique with Multiple Rounds
It is similar to the basic columnar technique but is introduced with an improvement. The basic columnar technique is performed over the plain text but more than once. The steps for columnar technique with multiple rounds are as follow:
Step 1: The plain text is written in the rectangle of predetermined size row by row.
Step 2: To obtain the cipher text, read the plain text in the rectangle, column by column. Before reading the text in rectangle column by column, permute the order of columns the same as in basic columnar technique.
Step 3: To obtain the final cipher text repeat the steps above multiple time.