Page 43 - DCAP516_COMPUTER_SECURITY
P. 43

Unit 4: Cryptography




          4.2 Two Fundamental Cryptographic Principles                                          Notes

          Principle 1: All encrypted message must contain some redundancy, that is, information not
          needed to understand the message, to prevent active intruders from tricking the receiver into
          acting on a false message.


                 Example: A mail-order company, The Couch Potato (TCP), with 60,000 products. Ordering
          messages consist of a 16-byte customer name followed by a 3-byte data field (1 byte for the
          quantity and 2 bytes for the product number).




             Notes  The last 3 bytes are to be encrypted using a very long key known only the customer
            and TCP.
          The following scenario shows how an active intruder—a recently-fired employee—can punish
          TCP for firing her.
          (a)  Before leaving, she takes (part of) the customer list with her.
          (b)  She works through the night writing a program to generate fictitious orders using real
               customer names.
          (c)  Since she does not have the list of keys, she just puts random numbers in the last 3 bytes,
               and send hundreds of orders to TCP.
          (d)  When the messages arrive, TCP’s computer uses the customer’s name to locate the key and
               decrypt the message.
          (e)  Unfortunately for TCP, almost every 3-byte message is valid!
          This problem can be solved by adding redundancy to all messages: e.g., extend the encrypted
          segment of an order from 3 bytes to 12 bytes, with the first 9 bytes being zeros (or a randomly
          chosen string of English words). Then the ex-employee is no longer able to generate a large
          stream of valid messages.

          What’s the problem with adding redundancy ?
          It makes it much easier for (passive) intruders to break messages (why ?)
          Principle 2: some measures must be taken to prevent active intruders from playing back old
          messages.
          One such measure:
          1.   Include in every message a timestamp valid for 5 minutes,

          2.   The receiver keeps messages around for 5 minutes, to compare newly arrived messages to
               previous ones to filter out duplicates.

          Self Assessment

          State whether the following statements are true or false:

          1.   The output of the encryption process, known as the ciphertext or …………………….
          2.   The art of breaking ciphers is called cryptanalysis …………………..
          3.   The art of devising ciphers and breaking them is collectively known as …………………...




                                           LOVELY PROFESSIONAL UNIVERSITY                                   37
   38   39   40   41   42   43   44   45   46   47   48