Cybersecurity Fundamentals: Authentication, Encryption & Threats

Message Authentication

Message authentication verifies that a message received over a communication channel is from the legitimate sender and has not been altered during transmission. It ensures data integrity, authenticity, and often non-repudiation (in the case of digital signatures).

Goals of Message Authentication

  • Authenticity: Confirms that the message came from the stated sender.
  • Integrity: Ensures the message has not been changed.
  • Non-repudiation (optional): Prevents the sender from denying having
Read More

Secure Key Communication: Methods, Protocols, and Security

Secure Key Communications

Three Methods for Secure Key Exchange:

  1. Trusted Third Party: A central server delegates keys. Every user has a secret key, and the server knows everyone’s keys.
    1. A → T: { A, B }
    2. T → A: { Na, Kab, B, {Kab, A}Kb }Ka
    3. A → B: { Kab }Kb

Problems with Trusted Third Party:

  • B doesn’t know who is communicating.
  • Replay attack.
  • If the server is compromised, it’s a single point of failure, and all user keys are compromised.
  • The server can crash due to a denial-of-service attack.

Needham-

Read More

Cryptography Fundamentals: Encryption, Authentication, PKI

Cryptography Fundamentals

1. General Model for Communication

  • Alice wants to send a message m to Bob.
  • Eve is an adversary who may try to eavesdrop or modify the message.
  • The goal of cryptography is to ensure that Eve cannot read or alter the message without authorization.

2. Encryption: Preventing Eavesdropping

  • Encryption is used to prevent Eve from reading the message.
  • Key Concepts:

    • Secret Key (Ke): A shared key between Alice and Bob. The longer the key, the higher the security.
    • Plaintext (m): The original
Read More

Cryptography: Ciphers, Security, and MAC

Miscellaneous: Secret (Symmetric), Public (Asymmetric).

Math:

  1. XOR (a ⊕ b) is 0 if the values are the same, 1 if they are different. c = (x ⊕ k) is random and independent of the original X.
  2. Addition: Given x is a binary string of length n, and a is an integer, then (a+x) is the n least significant bits of the binary encoding of adding the values a and x.
  3. Given n bits, Pr[any one string] = 1/2n.

Classical Ciphers/Principles:

  1. Shift: Shifts all letters by the same amount (key). It can be cracked by brute-
Read More

TCP Acknowledgments and Digital Certificate Verification

Understanding TCP Acknowledgments

(A) Why is acknowledgment 701 sent when the segment with sequence 801-900 is received? Because in TCP, acknowledgments are cumulative, which means that the acknowledgment number refers to the next expected byte, indicating that all previous bytes have been successfully received and are in order.

The sender sends segments with sequence numbers 501-600, 601-700, and 701-800. The segment with sequence number 701-800 is lost. The receiver successfully receives segments

Read More

Cryptography and Authentication: Principles and Techniques

Cryptography and Authentication: Core Concepts

Confidentiality: Can you keep a secret? Integrity: Did you get the same message I sent you? Identification/Authentication: Who are you? Can you prove it? Authorization & Access Control: What are you allowed to do? Availability: Are you there when needed?

Symmetric Key Cryptography (SKC)

Secure Key Cryptography: Vigenere Cipher: P XOR k = C, C XOR k = P. The first byte of the plaintext is XOR’ed with the first character of k, the second byte with the

Read More