General Concepts
Alice, Bob & Trudy.
Alice
should be able to send a message to Bob that
Trudy can't understand or modify
and Bob
is assured that Alice is the sender.
The attacker eavesdrops and read/record messages in transit.
The attacker may transmit new
messages, replay old messages,
modify/delete messages on transit.
Who are you?
Should you be doing that?
ACL (access
control list) & Groups.
· Malicious code written by bad guys.
· Modern mail systems
& Internet connectivity (Cable Modems/DSL) contribute to its spread.
· Virus Checkers: looks for instruction
sequences for known viruses
and uses message digests for files.
Unclassified < Confidential < Secret < Top Secret
No read-up (read higher rating object).
No write-down (write an object with lower
rating).
Very low bandwidth (e.g., 1 bit every 10 seconds),
but can be used to steal cryptographic keys.
E.g., a Trojan horse may use timing channel or storage channel
Loops 1
minute if a bit is 1 and waits 1 minute if
a bit is 0.
Creates a file for 1 minute if a
bit is 1 and deletes the file for 2 minute if a
bit is 0.
Hide secret messages in other messages.
E.g., hide messages in images by replacing the
least significant bit of each byte of the image with the bits of the message.
DEMO: /home/cs472/public_html/demos/steganography
To demo the propgram:
% more letter
% embed vatican.jpg letter vatican2.jpg
% decode vatican2.jpg letter2
% more letter2
Look at the two images: vatican & vatican2
and you will see no difference side-by-side!
Rates computer systems (D, C1,C2, B1,B2,B3 and A1). E.g.,
Luckily most patents have expired (e.g. RSA Sept 20,
2000),
and most export control has been lifted.
The US considered encryption as danger as the
weapons of mass destruction, like nuclear and biological
technology.