Information Security. Mark Stamp

Чтение книги онлайн.

Читать онлайн книгу Information Security - Mark Stamp страница 15

Information Security - Mark Stamp

Скачать книгу

How user‐friendly is your approach in part b)? What are some possible attacks on your proposed system?

      16 The PowerPoint slides at [135] describe a security class project where students successfully hacked the Boston subway system.Summarize each of the various attacks. What was the crucial vulnerability that enabled each attack to succeed?The students planned to give a presentation at the self‐proclaimed “hacker's convention,” Defcon. At the request of the Boston transit authority, a judge issued a temporary restraining order that prevented the students from talking about their work. Do you think this was justified, based on the material in the slides?What are war dialing and war driving? What is war “carting”?Comment on the production quality of the “melodramatic video about the warcart” (a link to the video can be found at [124]).

      1 1 Not to be confused with “Alice's Restaurant” [52].

      2 2 No, not that CIA.

      3 3 This sentence is brought to you by the Department of Redundancy Department.

      4 4 You did read that, right?

      5 5 If someone asks you why a specific weak security measure is used when better options are available, the correct answer is usually “money,” or it might simply be due to an inability to overcome inertia.

      6 6 Access control list, or ACL, is one of many overloaded terms that arise in the field of information security.

      7 7 Consider, for example, the infamous buffer overflow attack. Historically, this one of the most serious security flaws of all time. What is the grand theory behind this particular exploit? There isn't any—it's essentially made possible by a quirk in the way that memory is laid out in modern processors.

      8 8 Shadoobie [116].

      9 9 Believe it or not.

Part I Crypto

      Chapter 2

       The solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher—that is to say, they convey a meaning…

      —Edgar Allan Poe, The Gold Bug

monospace MXDXBVTZWVMXNSPBQXLIMSCCSGXSCJXBOVQXCJZMOJZCVC monospace TVWJCZAAXZBCSSCJXBQCJZCOJZCNSPOXBXSBTVWJC monospace JZDXGXXMOZQMSCSCJXBOVQXCJZMOJZCNSPJZHGXXMOSPLH monospace JZDXZAAXZBXHCSCJXTCSGXSCJXBOVQX

      —ciphertext

      In this chapter we discuss some of the basic elements of cryptography. This discussion will lay the foundation for the remaining crypto chapters which, in turn, underpin much of the material throughout the book. We'll avoid mathematical rigor as much as possible. Nevertheless, there is enough detail here so that you will not only understand the “what″ but you will also have some appreciation for the “how″ and “why.″

      After this introductory chapter, the remaining crypto chapters focus on modern symmetric key cryptography, public key cryptography, and cryptographic hash functions. A handful of topics that are related to cryptography—but not exactly cryptography, per se—are also covered in later chapters.

      The basic terminology of crypto includes the following:

       Cryptology— The art and science of making and breaking “secret codes.″

       Cryptography— The making of “secret codes.″

       Cryptanalysis— The breaking of “secret codes.″

       Crypto— A synonym for any or all of the above (and more), where the precise meaning should be clear from context.

      A cipher or cryptosystem is used to encrypt data. The original, unencrypted data is known as plaintext, and the result of encryption is ciphertext. We decrypt the ciphertext to recover the original plaintext. A key is used to configure a cryptosystem for encryption and decryption.

Schematic illustration of crypto as a black box.

      For an ideal cipher, it is infeasible to recover the plaintext from the ciphertext without the key. That is, even if the attacker, Trudy, has complete knowledge of the algorithms used and lots of other information (to be made more precise later), she can't recover the plaintext without the key. That's the goal, although reality sometimes differs.

      A fundamental tenet of cryptography is that the inner workings of a cryptosystem are completely known to the attacker, Trudy, and the only secret aspect is a key. This is known as Kerckhoffs’ principle, which, believe it or not, is due to a guy named Kerckhoffs.

      In 1883, Kerckhoffs, a Dutch linguist and cryptographer, laid out six principles of cipher design and use [67]. The principle that now bears his name states (among other things) that a cipher “must not be required to be secret, and it must be able to fall into the hands of the enemy without inconvenience.″ This implies that the design of the cipher is not secret.

Скачать книгу