Lecture 1: Computer Security
Lecture 1
What is a security protocol?
Sequence
of interactions between entities designed to achieve a certain end
Provide
security services across a distributed system.
Who
else does it involve?
- The
environment- considered to be hostile and intrusive, think intruders!
- A
trusted third party- ttp server such as paypal
The building blocks of a
message
M
means message
[M]K
means message is encrypted- K means key
[|M|]
K means digital signature
H(M)
means hash function
Note
that also have tuples (n-generalisation of a pair)
(M1,
M2, …, Mn) means its an N-Tuple
Nonce
Is
a fresh and random value, usually a number which is unique and unpredictable,
usually written with symbol: Ns
Timestamps
data representing current time and date, usually symbol T
data representing current time and date, usually symbol T
Strings-
words, letters etc.
words, letters etc.
Alternative to the crypto
jargon is below!
Encrypt(M,
K) means encryption
Sign(M,
K) means digital signature
Hash(M)
means hash function
Reverse
operations- although never appearing in messages would be
Decrypt
(M, K) decryption
Validate
(M, K) digital signature validate
Example
message
Notice
P means public key and Pr means private!
May
want to see more messages to try and get the hang of it
in this case- message is being sent, along with nonce A-
this message is encrypred with the public key of B, alongside a timestamp- it is all signed with the private key of A as it is outside the brackets
in this case- message is being sent, along with nonce A-
this message is encrypred with the public key of B, alongside a timestamp- it is all signed with the private key of A as it is outside the brackets
Secrecy
Note
that in 1 the message is secret in transferal of A to B
Known
as I/O secrecy, input output
Whereas
2, the message is created WITHIN the protocol but not passed as I/O
Example
Kab
is the session key, as it is used straight after the end of a protocol to
encrypt and communicate secure messages
The
key is used to encrypt and decrypt the message
Also
can trust the key was produced by A as it is the same message and signed by A
Authentication
Of
origin- being able to authenticate messages origin is who it is supposed to be
Entity-
verifiy it REALLY is that person.
Non-Repudiation
Can
produce some evidence that certain interactions in the protocol have occurred
In
the picture above can see that server accepted and was happy A was creator of
message
Encrypting
messages means third party will be able to see some even has occurred but not
know exactly what occurred
Message
encrypted wit Kab but attacker doesn’t know that key!
so therefore, by knowing the private
so therefore, by knowing the private




Comments
Post a Comment