KEMBAR78
Unit 1 Notes | PDF | Encryption | Cryptography
0% found this document useful (0 votes)
7 views4 pages

Unit 1 Notes

Module 1 introduces key concepts in computer security, including the OSI Security Architecture, security attacks, and essential security services and mechanisms. It covers classical encryption techniques, foundations of modern cryptography, and various methods of cryptanalysis. The module emphasizes the importance of confidentiality, integrity, and availability in protecting information and systems.

Uploaded by

Divya Ghadge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Unit 1 Notes

Module 1 introduces key concepts in computer security, including the OSI Security Architecture, security attacks, and essential security services and mechanisms. It covers classical encryption techniques, foundations of modern cryptography, and various methods of cryptanalysis. The module emphasizes the importance of confidentiality, integrity, and availability in protecting information and systems.

Uploaded by

Divya Ghadge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Module 1: Introduction To Security

Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services and Mechanisms – A Model for Network Security – Classical encryption techniques:
Substitution techniques, Transposition techniques, Steganography – Foundations of modern
cryptography: Perfect security – Information Theory – Product Cryptosystem –
Cryptanalysis.

Unit: Computer Security and Cryptography

1. Computer Security Concepts

 Computer Security involves protecting information and systems from unauthorized access,
disruption, modification, or destruction.

 Security Goals:

o Confidentiality – Ensuring information is not disclosed to unauthorized individuals.

o Integrity – Maintaining the accuracy and completeness of data.

o Availability – Ensuring authorized users have access to information when needed.

 Other Key Concepts:

o Authentication – Verifying the identity of users.

o Authorization – Granting permissions to users based on identity.

o Non-repudiation – Ensuring that someone cannot deny the validity of their actions.

2. OSI Security Architecture

The OSI Security Architecture defines a systematic approach to securing networked systems,
outlined by the ISO.

 Security Attacks: Actions that compromise the security of information.

 Security Mechanisms: Methods to prevent, detect, or recover from security attacks.

 Security Services: Enhance the security of data processing systems and data transfers (e.g.,
confidentiality, integrity, authentication).

Security Services include:

1. Authentication

2. Access Control

3. Data Confidentiality
4. Data Integrity

5. Non-repudiation

3. Security Attacks

Passive Attacks:

 Eavesdropping

 Traffic Analysis

 Aim: Learn or make use of information without affecting system resources.

Active Attacks:

 Masquerade

 Replay

 Modification of messages

 Denial of Service (DoS)

 Aim: Alter system resources or affect their operation.

4. Security Services and Mechanisms

Security Services provide protection for network communication:

 Authentication

 Integrity

 Confidentiality

 Non-repudiation

 Access Control

Security Mechanisms are tools or protocols to implement services:

 Encipherment (Encryption)

 Digital Signatures

 Access Controls

 Data Integrity Checks

 Authentication Protocols

5. A Model for Network Security

A generic model includes:


 Sender and Receiver: Communicate over an insecure channel.

 Security Transformation: Message is encrypted or digitally signed.

 Secret Information: Shared keys or credentials.

 Trusted Third Parties: Certificate Authorities, Key Distribution Centers.

6. Classical Encryption Techniques

a. Substitution Techniques

Replace elements of the plaintext with ciphertext characters.

 Caesar Cipher

 Monoalphabetic Cipher

 Playfair Cipher

 Vigenère Cipher

b. Transposition Techniques

Rearrange the characters of the plaintext without altering the actual characters.

 Rail Fence Cipher

 Columnar Transposition

c. Steganography

 Hides the existence of the message.

 Common methods:

o Hiding text in images, audio, or video.

o Least Significant Bit (LSB) technique.

7. Foundations of Modern Cryptography

a. Perfect Security

 Proposed by Claude Shannon.

 A system is perfectly secure if ciphertext does not reveal any information about plaintext.

 One-Time Pad: The only known perfectly secure encryption scheme.

b. Information Theory

 Introduced by Shannon.

 Entropy: Measures the unpredictability of information content.

 Helps in analyzing the strength of cryptographic systems.


c. Product Cryptosystem

 Combines multiple cipher types (e.g., substitution + transposition).

 Example: DES uses multiple rounds of substitution and permutation.

d. Cryptanalysis

 The science of breaking ciphers or recovering plaintext without key.

 Types:

o Brute Force Attack

o Known-plaintext Attack

o Chosen-plaintext Attack

o Ciphertext-only Attack

o Differential and Linear Cryptanalysis (modern techniques)

Let me know if you want these notes formatted as a PDF, PowerPoint, or include
diagrams/flowcharts.

You might also like