Module 1: Introduction To Security
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services and Mechanisms – A Model for Network Security – Classical encryption techniques:
Substitution techniques, Transposition techniques, Steganography – Foundations of modern
cryptography: Perfect security – Information Theory – Product Cryptosystem –
Cryptanalysis.
Unit: Computer Security and Cryptography
1. Computer Security Concepts
Computer Security involves protecting information and systems from unauthorized access,
disruption, modification, or destruction.
Security Goals:
o Confidentiality – Ensuring information is not disclosed to unauthorized individuals.
o Integrity – Maintaining the accuracy and completeness of data.
o Availability – Ensuring authorized users have access to information when needed.
Other Key Concepts:
o Authentication – Verifying the identity of users.
o Authorization – Granting permissions to users based on identity.
o Non-repudiation – Ensuring that someone cannot deny the validity of their actions.
2. OSI Security Architecture
The OSI Security Architecture defines a systematic approach to securing networked systems,
outlined by the ISO.
Security Attacks: Actions that compromise the security of information.
Security Mechanisms: Methods to prevent, detect, or recover from security attacks.
Security Services: Enhance the security of data processing systems and data transfers (e.g.,
confidentiality, integrity, authentication).
Security Services include:
1. Authentication
2. Access Control
3. Data Confidentiality
4. Data Integrity
5. Non-repudiation
3. Security Attacks
Passive Attacks:
Eavesdropping
Traffic Analysis
Aim: Learn or make use of information without affecting system resources.
Active Attacks:
Masquerade
Replay
Modification of messages
Denial of Service (DoS)
Aim: Alter system resources or affect their operation.
4. Security Services and Mechanisms
Security Services provide protection for network communication:
Authentication
Integrity
Confidentiality
Non-repudiation
Access Control
Security Mechanisms are tools or protocols to implement services:
Encipherment (Encryption)
Digital Signatures
Access Controls
Data Integrity Checks
Authentication Protocols
5. A Model for Network Security
A generic model includes:
Sender and Receiver: Communicate over an insecure channel.
Security Transformation: Message is encrypted or digitally signed.
Secret Information: Shared keys or credentials.
Trusted Third Parties: Certificate Authorities, Key Distribution Centers.
6. Classical Encryption Techniques
a. Substitution Techniques
Replace elements of the plaintext with ciphertext characters.
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Vigenère Cipher
b. Transposition Techniques
Rearrange the characters of the plaintext without altering the actual characters.
Rail Fence Cipher
Columnar Transposition
c. Steganography
Hides the existence of the message.
Common methods:
o Hiding text in images, audio, or video.
o Least Significant Bit (LSB) technique.
7. Foundations of Modern Cryptography
a. Perfect Security
Proposed by Claude Shannon.
A system is perfectly secure if ciphertext does not reveal any information about plaintext.
One-Time Pad: The only known perfectly secure encryption scheme.
b. Information Theory
Introduced by Shannon.
Entropy: Measures the unpredictability of information content.
Helps in analyzing the strength of cryptographic systems.
c. Product Cryptosystem
Combines multiple cipher types (e.g., substitution + transposition).
Example: DES uses multiple rounds of substitution and permutation.
d. Cryptanalysis
The science of breaking ciphers or recovering plaintext without key.
Types:
o Brute Force Attack
o Known-plaintext Attack
o Chosen-plaintext Attack
o Ciphertext-only Attack
o Differential and Linear Cryptanalysis (modern techniques)
Let me know if you want these notes formatted as a PDF, PowerPoint, or include
diagrams/flowcharts.