first commit
This commit is contained in:
@@ -0,0 +1,53 @@
|
||||
## Lecture 1 (12:00) - Data Communication Security
|
||||
|
||||
### Normal Communication
|
||||
|
||||
Alice => Message => Bob
|
||||
|
||||
- We assume:
|
||||
- A dedicated transmission system
|
||||
- Good will, Co-operation, Competence among participants
|
||||
These are not valid assumptions.
|
||||
|
||||
### Security
|
||||
|
||||
- Human problem caused by deliberate exploitation of weakness in the transmission system.
|
||||
- Bad passwords, spoofing / phishing, config errors
|
||||
- Bad procedures, backdoors, overcomplexity
|
||||
- Can solve some problems, manage some, and detect some, but cannot fix everything.
|
||||
- Security threats are generic to all forms of communication, not specifically computers or digital devices. Understanding them is vital to understanding IT.
|
||||
|
||||
### Password Security
|
||||
|
||||
- Password file must always be assumed to be readable
|
||||
- Contains encrypted passwords.
|
||||
- "Dictionary Attacks"
|
||||
- Pre-encode a dictionary of words (and combination of words). Then simply look up any encoded passwords.
|
||||
- "Cracker" Programs / "Brute force attacks"
|
||||
|
||||
### Encryption
|
||||
|
||||
- Scramble the message in some way so that it is only meaningful to Alice and Bob.
|
||||
- Alice takes message and applies some algorithm to each of the letters to generate an encrypted message.
|
||||
- Bob applies the reverse algorithm to regenerate the original message
|
||||
- The aim is that Eve cant do one (or both) of these things
|
||||
- If she cant decrypt, she cant eavesdrop
|
||||
- If she cant encrypt, she cant masquerade.
|
||||
- The more keys, the longer it takes to break
|
||||
|
||||
#### Caesar-shift
|
||||
|
||||
- Each letter is replaced by another letter, k positions later in the alphabet
|
||||
- If k=3:
|
||||
- A becomes D
|
||||
- B becomes E
|
||||
- C becomes F
|
||||
- …
|
||||
- "ATTACK AT TEN" becomes
|
||||
- DWWDFN DW WHQ
|
||||
- plaintext - ATTACK AT TEN
|
||||
- ciphertext - DWWDFN DW WHQ
|
||||
- Encryption method - Substitution
|
||||
- Encryption Key - 3
|
||||
- Decryption Key - 3
|
||||
- Problem is how to share the key
|
Reference in New Issue
Block a user