university:anna university
year:4th
sem:07
dept:ece
subject code:EC2035
subject:cryptography and network security
content:EC2035-cryptography and network security-lecture notes for unit 3-edition 2014
AUTHENTICATION REQUIREMENTS
• Kind of attacks (threats) in the context of communications across a network
1. Disclosure
2. Traffic analysis
3. Masquerade
4. Content modification
5. Sequence modification
6. Timing modification
7. Repudiation
1. Disclosure: Release of message contents to any person or process not possessing the appropriate cryptographic key.
2. Traffic analysis
• Discovery of the pattern of traffic between parties.
• In a connection-oriented application, the frequency and duration of connections could be determined.
• In either a connection-oriented or connectionless environment, the number and length of messages between parties could be determined.
3. Masquerade
• Insertion of messages into the network from a fraudulent source.
• Includes the creation of messages by an opponent that are purported to come from an authorized entity.
• Also included are fraudulent acknowledgments of messages receipt or non receipt by someone other than the message recipient.
4. Content modification
• Changes to the contents of a message, including insertion, deletion, transportation and modification.
• Kind of attacks (threats) in the context of communications across a network
1. Disclosure
2. Traffic analysis
3. Masquerade
4. Content modification
5. Sequence modification
6. Timing modification
7. Repudiation
1. Disclosure: Release of message contents to any person or process not possessing the appropriate cryptographic key.
2. Traffic analysis
• Discovery of the pattern of traffic between parties.
• In a connection-oriented application, the frequency and duration of connections could be determined.
• In either a connection-oriented or connectionless environment, the number and length of messages between parties could be determined.
3. Masquerade
• Insertion of messages into the network from a fraudulent source.
• Includes the creation of messages by an opponent that are purported to come from an authorized entity.
• Also included are fraudulent acknowledgments of messages receipt or non receipt by someone other than the message recipient.
4. Content modification
• Changes to the contents of a message, including insertion, deletion, transportation and modification.
Attachment link:
Unit-3 peri.pdf (Size: 711.53 KB / Downloads: 973)