Group 1&2 CS412
Group 1&2 CS412
Group 1&2 CS412
• In this model, to verify a security of a system, the state is used, which means all current
permissions and all current instances of subjects accessing objects must be captured.
• Maintaining the state of a system deals with each subject’s association with objects.
• If the subjects can only access objects by means that are concurrent with the security
policy, the system is secure.
• A state of a system is a snapshot of a system in one moment of time.
• There are many activities that can alter this state, which is referred to as a state transition.
• A system that has employed a state machine model will be in a secure state in each and
every instance of its existence
Bell-LaPadula Model
ENTITES
• SUBJECT: It is any user who is requesting for Data Items.
• CONSTRAINED DATA ITEMS: It cannot be accessed directly by
the Subject. These need to be accessed via Clarke Wilson Security
Model
• UNCONSTRAINED DATA ITEMS: It can be accessed directly by
the Subject.
CLARKE-WILSON COMPONENTS
• TRANSFORMATION PROCESS: Here, the Subject’s request to access
the Constrained Data Items is handled by the Transformation process
which then converts it into permissions and then forwards it to
Integration Verification Process
• INTEGRATION VERIFICATION PROCESS: The Integration Verification
Process will perform Authentication and Authorization. If that is
successful, then the Subject is given access to Constrained Data Items.
BREWER AND NASH
• The model is referred to as the chinese wall model.
• It can eliminate conflict of interest by preventing individuals , like
consultants, from signing onto more than one COI, i.e, rows of
interests categories.
• The modification of access control policies is based on the behaviour
of users. This means that if a user who has access to the data is on the
right side, they cannot access data from the other side or are
unavailable to the same user.
HARRISON RUZZO ULLMAN
• Is an add on model to the BLP model. The BLP model lacks a
mechanism for changing access privileges or creating or deleting
objects or subjects.
• This Harrison Ruzzo Ullman model fixes the issue by authorizing the
structures to be used for access rights distribution and checking
compliance with the policy that prohibits access to non-authorized
users.
• This model can be implemented through an access control list or
capabilities list.
Cryptography and Cryptanalysis
• Cryptography is a method of protecting information and communications
through the use of codes, so that only those for whom the information is
intended can read and process it.
• In computer science, cryptography refers to secure information and
communication techniques derived from mathematical concepts and a set of
rule-based calculations called algorithms, to transform messages in ways that are
hard to decipher.
• These deterministic algorithms are used for cryptographic key generation,
digital signing, verification to protect data privacy, web browsing on the internet
and confidential communications such as credit card transactions and email.
• Three main types of cryptography are
Cryptography
plaintext ciphertext plaintext
Encryption Decryption
Key KA Key KB
Three main types of cryptography are
• Symmetric key encryption: This type of encryption uses the same key to encrypt and
decrypt messages. The keys used in this type of encryption must be kept secret by both
parties, making them vulnerable to attack by hackers. Symmetric keys are most commonly
used for public key systems.
• Asymmetric key encryption: This type of encryption uses two keys instead of one. One
key is used for encryption, and another key is used for decryption. These keys do not have
to be kept secret because they are only used once per message and can be reused
multiple times. Asymmetric keys are most commonly used in public-key systems.
• Public-key encryption: Public-key systems use a pair of mathematically related keys that
cannot be derived from each other without knowing the different keys (a process known
as factoring). This means that even if someone finds your private key, they will only be
able to derive your public key (and vice versa).
• Techniques Used For Cryptography
The most commonly used techniques in cryptography, are,
• Symmetric Key Cryptography,
• Asymmetric Key Cryptography,
• Hashing,
• Secret Sharing,
• Digital Signatures,
• Elliptic Curve Cryptography,
• Quantum Cryptography,
• Steganography,
• Zero-Knowledge Proofs,
• Homomorphic Encryption.
Features of Cryptography
• Some of the crucial features of cryptography are,
• Authentication: Authentication is the process of verifying the identity of a person or entity. It ensures that only authorized personnel
can access confidential data or personal networks.
• Confidentiality: Confidentiality is keeping data or information secret from unauthorized individuals or entities. It is used to ensure
that the data is only accessible by authorized personnel.
• Integrity: Integrity ensures that data is not modified, corrupted, or tampered with during transmission or storage.
• Non-repudiation: Non-repudiation ensures that the sender or receiver cannot deny a transaction or communication at a later date.
• Authorization: Authorization is the process of allowing authorized personnel access to specific data or networks.
• Key Management: Key management securely stores, distributes, and manages cryptographic keys.
Applications Of Cryptography
Electronic Commerce: Cryptography is used in e-commerce to protect data from theft and misuse. Digital signatures, encryption,
and authentication protocols secure online transactions.
Secure Storage: Encryption is used to store data securely on storage devices like external hard drives, USBs, memory cards, etc.
Wireless Network Security: Cryptography secures wireless networks from attacks. It is used to authenticate users and encrypts data
transmitted over the web.
Online Banking: Cryptography is used to secure online banking transactions. It is used to authenticate users, encrypt data, and
securely transfer funds.
Secure Email: Cryptography is used to send emails securely. It is used to authenticate users, encrypt data, and ensure that emails are
transmitted securely.
ADVANTAGES AND DISADVANTAGES
OF CRYPTOGRAPHY
Advantages
• Security: Encryption provides privacy and protection from unauthorized access to data.
• Authentication: Digital signatures can provide authentication, ensuring the sender is who they say they are.
• Integrity: Data integrity ensures that the message has not been changed in transit.
• Digital signatures: Cryptography can also be used to create digital signatures, verifying a sender's identity.
Disadvantages
• Speed: Encryption can slow down during the data transmission, taking longer than unencrypted messages.
• Require a large amount of power: Cryptography is computationally intensive, requiring large amounts of
computing power to encrypt and decrypt data.
• Vulnerable: It is also susceptible to cryptographic attacks, such as brute-force attacks, that can compromise
the security of encrypted data.
• Requiring a high skill: Cryptography requires a high degree of skill, knowledge, and resources to
implement correctly.
CRYPTANALYSIS
• Cryptanalysis is the study of methods for obtaining the meaning of
encrypted information, without access to the secret information that
is typically required to do so. Typically, this involves knowing how the
system works and finding a secret key. Cryptanalysis is also referred to
as codebreaking or cracking the code. The ciphertext is generally the
easiest part of a cryptosystem to obtain and, therefore, is an
important part of cryptanalysis. Depending on what information is
available and what type of cipher is being analyzed, cryptanalysts can
follow one or more attack models to crack a cipher.
Cryptanalysis Techniques
• Brute force: try every key
• Ciphertext-only attack:
• Attacker knows ciphertext of several messages encrypted with same
key (but doesn’t know plaintext).
• Possible to recover plaintext (also possible to deduce key) by looking
at frequency of ciphertext letters
• Known-plaintext attack:
• Attackers observes pairs of plaintext/ciphertext encrypted with same
key.
• Possible to deduce key and/or devise algorithm to decrypt ciphertext.
Cryptanalysis Techniques
• Chosen-plaintext attack:
• Attacker can choose the plaintext and look at the paired ciphertext
• Attacker has more control than known-plaintext attack and may be
able to gain more info about key
• Adaptive Chosen-Plaintext attack:
• Attacker chooses a series of plaintexts, basing the next plaintext on
the result of previous encryption
• Examples
• Differential cryptanalysis – DES is resistant it
• Linear cryptanalysis
• Cryptanalysis attacks often exploit the redundancy of
natural language
• Lossless compression before encryption removes
redundancy
Types of ciphers
Substitution Cipher
• Substitution of single letters separately—simple substitution—can be demonstrated by writing out the alphabet in some order to represent the
substitution. This is termed a substitution alphabet. The cipher alphabet may be shifted or reversed (creating the Caesar and Atbash ciphers,
respectively) or scrambled in a more complex fashion, in which case it is called a mixed alphabet or deranged alphabet.
Transposition Cipher
• A transposition cipher is a method of encryption in which the positions held by units of plaintext (which are commonly characters or groups of
characters) are shifted according to a regular system so that the ciphertext constitutes a permutation of the plaintext.
Block Cipher
• a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified
by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols and are widely used to
implement encryption of bulk data.
Stream Cipher
• a stream cipher is a symmetric key cipher in which plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a
stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext
stream.
Password Cracking
• In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by
a computer system. A common approach is to try guesses for the password repeatedly.