General Concepts

Alice, Bob & Trudy.

Alice should be able to send a message to Bob that
Trudy can't understand or modify
and Bob is assured that Alice is the sender.

The attacker eavesdrops and read/record messages in transit.

The attacker may transmit new messages, replay old messages,
modify/delete messages on transit.

Who are you?

Should you be doing that?
ACL (access control list) & Groups.

·      Malicious code written by bad guys.

·      Modern mail systems  & Internet connectivity (Cable Modems/DSL) contribute to its spread.

·      Virus Checkers: looks for instruction sequences for known viruses
and uses message digests for files.

 

Unclassified < Confidential < Secret < Top Secret

No read-up (read higher rating object).
No write-down (write an object with lower rating).

Very low bandwidth (e.g., 1 bit every 10 seconds),
but can be used to steal cryptographic keys.
E.g., a Trojan horse may use timing channel or storage channel
Loops 1 minute if a bit is 1 and waits 1 minute if  a bit is 0.

Creates a file for 1 minute if a  bit is 1 and deletes the file for 2 minute if  a bit is 0.

 

Hide secret messages in other messages.
E.g., hide messages in images by replacing the least significant bit of each byte of the image with the bits of the message.
DEMO:  /home/cs472/public_html/demos/steganography

 

To demo the propgram:

% more letter

% embed vatican.jpg letter vatican2.jpg

% decode vatican2.jpg letter2

% more letter2

Look at the two images: vatican & vatican2 and you will see no difference side-by-side!

 

 

 

Rates computer systems (D, C1,C2, B1,B2,B3 and A1). E.g.,

 

Luckily most patents have expired (e.g. RSA Sept 20, 2000),
and  most export control has been lifted.
The US considered encryption as danger as the weapons of mass destruction,  like nuclear and biological technology.