Beruflich Dokumente
Kultur Dokumente
These include:
Damage or destruction of computer systems.
Damage or destruction of internal data.
Loss of sensitive information to hostile parties.
Use of sensitive information to steal elements of monitary value.
Use of sensitive information against the customers which may result
in
customers.
Damage to the reputation of an organization.
Monitory damage, due to loss of sensitive information, destruction
of
reputation of the
organization.
and varied
attackers or opponents.
system or its
harm
Vulnerability is a weakness in the
A human
handle.
techniques?
Substitutions are the simple form of encryption in which one
letter is
way of encrypting
have
been the first to use this scheme, in which each letter is translated
to a
comes from
The
not reused,
transposition techniques
The goal of substitution is confusion; the encryption
method is an attempt to
make it difficult for a cryptanalyst or intruder to determine how a
message
transposition is an
a rearrangement
permutation.
into columns.
shown here.
c1
c2
C3
c6
c7
C8
c11
c12
etc.
c4
c9
c5
c10
This type is again arranging the letters and reading them off
again. Therefore, the algorithm requires a constant amount of
work per character,
the message.
frequently
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext d e f g h i j k l m n o p q r s t u v w x y z a b c
SIKKIM MANIPAL UNIVERSITY
would be encoded as
SIKKIM MANIPAL UNIVERSITY
vl nnl p pd qls do x q ly huv lwb
mind: A
implementation
thereby
and Es is useless.
encipherment
Principle 4
at most same.
characters
sender can
Public key
read or modified) by
for
data converts it
deciphering
the technique
Figure
DES uses only standard arithmetic and logical operations on numbers
up to
for implementation on a
single-purpose chip.
of a message
RSA is an exponentiation cipher. You have to follow the following two
steps.
1. Choose two large prime numbers p and q, and let n = pq. The
totient (n)
Example: Let n = 10. The numbers that are less than 10 and are
relatively
7, and 9. Hence,
second integer d such that ed mod (n) = 1. The public key is (e,
n), and the private key is d.
Let m be a message. Then:
c = me mod n
and
m = cd mod n.
each plaintext
plaintext is 07 04 11 11 14
26 22 14 17 11 03. Using Alice's public key, the ciphertext is
0717 mod 77 = 28
0417 mod 77 = 16
1117 mod 77 = 44
...
0317 mod 77 = 75
or 28 16 44 44 42 38 22 42 19 44 75.
RSA can provide data and origin
authentication. If Alice enciphers her message using her private
key, anyone can read it,
correctly.
11 03.
"secure, it
means that security implies some degree of trust that the program
enforces expected
Fixing Faults
One approach to judge quality in security is fixing faults. You might
argue that a module in which 100 faults were discovered and fixed
is better than
paradigm of "penetrate
repaired faults.
efforts were
design or
Unexpected Behavior
The inadequacies of penetrate-and-patch led researchers to seek a
better way to be confident that code meets its security
requirements. One way to do that is to compare the requirements
with the behavior. That is, to understand program security, we can
examine programs to see whether
10.
Logical separation:
In which users operate under the illusion that no other processes
exist,
accesses so that
permitted domain
Physical separation:
Each and every process has its own physical objects, such as
separate
security.
Cryptographic separation:
Each process will protect their data and computations in such a way
that
Temporal separation:
In which processes having different security requirements are
executed
at different times
There are several ways an operating
times.
Isolate. An operating system providing Isolation feature allow
different
presence of the
or only to the
owners respectively.
a specific user
objects. The
subject, on the
itself.
Limit use of an object. This form of protection limits not just
the access to
in a database