Beruflich Dokumente
Kultur Dokumente
SECURITY
LECTURE 1
INTRODUCTIO
N
M M Waseem Iqbal
Who am I !!!
Assignments (Many)
Quizzes (You Decide)
%
Presentations
OHT 1 & 2 30%
Final Exam 50%
20
Introduction
Cryptography
Background
7
Definitions
8
Aim of Course
9
Aspects of Security
11
security attack
security mechanism
security service
Security Attack
12
passive
active
Passive Attacks
13
14
Bob
Alice
Attacker (Eve)
observes pattern of
messages
Active Attacks
15
Bob
Attacker
(Eve)
Alice
Balance =
$1
Bob
Balance =
$1
Balance =
$1,000,000
Balance =
$1,000,000
Attacker (Eve) intercepts
and alters messages
Alice
18
Server
Overloaded By
Message Flood
Attacker
Example
Scenarios
A sends a file to B: E intercepts
it and reads it
How to send a file that is not readable to all except intended receiver?
A send a file to B: E intercepts it, modifies it, and then
forwards it to B
How to make sure that the document has been received unaltered ?
E sends a file to B pretending it is from A
How to make sure your communication partner is really who he claims
to be ?
A sends a message to B: E is able to delay the message for a
while
How to detect this ?
A sends a message to B. Later A (or B) denies having sent
(received) the message How to deal with electronic contracts
19
Security Service
20
Security Services
21
X.800:
a service provided by a protocol layer of
communicating open systems, which
ensures adequate security of the systems or
of data transfers
RFC 2828:
a processing or communication service
provided by a system to give a specific kind
of protection to system resources
Security Mechanism
23
cryptographic techniques
24
Security Mechanisms
(X.800)
27
28