Unit I Notes
Unit I Notes
UNIT-I
Security Attack - Non-cryptographic Protocol Vulnerabilities - Software Vulnerabilities -
The need for security - Security services - Security Mechanisms- Classical encryption:
Classical Techniques.
2. Define cryptanalysis.
The study of principles and methods of transforming an unintelligible message back into an
intelligible message without the knowledge of the key. It is also called code breaking.
6. List the components involved in network security (i.e. Model for network security)
Message
Two principals (Source and Destination)
Trusted third party
Opponent
A phishing attack is a type of social engineering where attackers trick victims into
revealing sensitive information—like passwords, credit card numbers, or login credentials—
by pretending to be a legitimate or trusted entity, often through email, websites, text
messages, or phone calls.
PART-B
5 MARKS
1. Explain briefly about the various security attacks in details.
Computer security is security applied to computing devices such as computers and
smartphones, as well as computer networks such as private and public networks, including the whole
Internet.
The field covers all the processes and mechanisms by which digital equipment, information
and services are protected from unintended or unauthorized access, change or destruction, and are of
growing importance in line with the increasing reliance on computer systems of most societies
worldwide. It includes physical security to prevent theft of equipment, and information security to
protect the data on that equipment. It is sometimes referred to as "cyber security" or "IT security",
though these terms generally do not refer to physical security (locks and such).
Some important terms used in computer security are:
Vulnerability:
Vulnerability is a weakness which allows an attacker to reduce a system's information
assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker
access to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must
have at least one applicable tool or technique that can connect to a system weakness. In this frame,
vulnerability is also known as the attack surface. Vulnerability management is the cyclical practice of
identifying, classifying, remediating, and mitigating [Link] practice generally refers to
software vulnerabilities in computing systems.
Backdoors :
A backdoor in a computer system, is a method of bypassing normal authentication, securing
remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain
undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be
a modification to an existing program or hardware device. It may also fake information about disk and
memory usage.
Denial-of-service attack:
Unlike other exploits, denials of service attacks are not used to gain unauthorized access or
control of a system. They are instead designed to render it unusable. Attackers can deny service to
individual victims, such as by deliberately entering a wrong password enough consecutive times to
Direct-access attacks: An unauthorized user gaining physical access to a computer (or part thereof)
can perform many functions, install different types of devices to compromise security, including
operating system modifications, software worms, key loggers, and covert listening devices. The
attacker can also easily download large quantities of data onto backup media, for instance CD-
R/DVD-R, tape; or portable devices such as key drives, digital cameras or digital audio players.
Another common technique is to boot an operating system contained on a CD-ROM or other bootable
media and read the data from the hard drive(s) this way. The only way to defeat this is to encrypt the
storage media and store the key separate from the system. Direct-access attacks are the only type of
threat to Standalone computers (never connect to internet), in most cases.
Eavesdropping :
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts
on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI
and NSA to eavesdrop on the systems of internet service providers.
Spoofing:
Spoofing of user identity describes a situation in which one person or program successfully
masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Tampering :
Tampering describes an intentional modification of products in a way that would make them harmful
to the consumer.
Repudiation:
Repudiation describes a situation where the authenticity of a signature is being challenged.
Information disclosure:
Information Disclosure (Privacy breach or Data leak) describes a situation where information, thought
as secure, is released in an untrusted environment. Elevation of privilege Elevation of Privilege
describes a situation where a person or a program want to gain elevated privileges or access to
resources that are normally restricted to him/it.
Indirect attacks An indirect attack is an attack launched by a third-party computer. By using someone
else's computer to launch an attack, it becomes far more difficult to track down the actual attacker.
There have also been cases where attackers took advantage of public anonymizing systems, such as
the tor onion router system.
Computer crime: Computer crime refers to any crime that involves a computer and a network.
Connection-Oriented Integrity Service: This service deals with a stream of messages, assures that
messages are received as sent, with no duplication, insertion, modification, reordering or replays.
Destruction of data is also covered here. Hence, it attends to both message stream modification and
denial of service.
Connectionless-Oriented Integrity Service: It deals with individual messages regardless of larger
context, providing protection against message modification only.
An integrity service can be applied with or without recovery. Because it is related to active
attacks, major concern will be detection rather than prevention. If a violation is detected and the
service reports it, either human intervention or automated recovery machines are required to recover.
Non-repudiation:
Non-repudiation prevents either sender or receiver from denying a transmitted message. This
capability is crucial to e-commerce. Without it an individual or entity can deny that he, she or it is
responsible for a transaction, therefore not financially liable.
Access Control
This refers to the ability to control the level of access that individuals or entities have to a
network or system and how much information they can receive. It is the ability to limit and control the
access to host systems and applications via communication links. For this, each entity trying to gain
access must first be identified or authenticated, so that access rights can be tailored to the individuals.
Availability
It is defined to be the property of a system Media or a system resource being accessible and
usable upon demand by an authorized system entity. This can significantly be affected by a variety of
attacks, some amenable to automated counter measures i.e authentication and encryption and others
need some sort of physical action to prevent or recover from loss of availability of elements of
distributed system.
According to X.800, the security mechanisms are divided into those implemented in a specific
protocol layer and those that are not specific to any particular protocol layer or security service. X.800
also differentiates reversible & irreversible encipherment mechanisms. A reversible encipherment
mechanism is simply an encryption algorithm that allows data to be encrypted and subsequently
Digital Signature: The appended data or a cryptographic transformation applied to any data
unit allowing to prove the source and integrity of the data unit and protect against forgery.
Access Control: A variety of techniques used for enforcing access permissions to the
system resources.
Data Integrity: A variety of mechanisms used to assure the integrity of a data unit or stream
of data units.
Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic analysis
attempts.
Routing Control: Enables selection of particular physically secure routes for certain data
and allows routing changes once a breach of security is suspected.
Notarization: The use of a trusted third party to assure cert in properties of a data exchange
Definitions
Computer Security – generic name for the collection of tools designed to protect data and to
thwart hackers
Network Security – measures to protect data during their transmission
Internet Security - measures to protect data during their transmission over a collection of
interconnected networks our focus is on Internet Security
PART -C
10 MARKS
1. Describe in detail about the Non-cryptographic Protocol Vulnerabilities.
Non-cryptographic protocol vulnerabilities are flaws within network communication protocols
that, unlike cryptographic failures, don't involve weaknesses in encryption or hashing
Flood attacks:
By saturating a targeted server with an overwhelming amount of packets, a malicious actor is
able to oversaturate server capacity, resulting in denial-of-service. In order for most DoS flood attacks
to be successful, the malicious actor must have more available bandwidth than the target.
1. ✅ IP Spoofing
The attacker sends IP packets with a false source IP address to disguise their identity.
Purpose:
o To impersonate a trusted system.
o To bypass IP-based authentication.
o Often used in DoS/DDoS attacks.
Impact:
o Man-in-the-middle attacks.
o Session hijacking.
o Network trust exploitation.
Forging the ―From‖ address in an email to make it appear from a trusted sender.
Purpose:
o Phishing attacks.
o Malware distribution.
o Social engineering.
Impact:
o Identity theft.
o Financial fraud.
o Spread of misinformation.
3. ✅ Caller ID Spoofing
4. ✅ GPS Spoofing
Transmitting fake GPS signals to deceive a GPS receiver about its actual location.
Purpose:
o Misguide drones, ships, or vehicles.
o Avoid tracking or geofencing.
Impact:
o Navigation disruption.
o Loss of control in autonomous systems.
o Military and aviation risks.
Buffer overflows
Buffer overflows occur when a program writes more data to a fixed-size memory buffer than
it can accommodate, causing that data to spill into adjacent memory. This can overwrite variables,
corrupt return addresses, or disrupt control flow. The issue is especially common in low-level
languages like C and C++, which lack built-in memory safety features.
While often considered an ―old-school‖ vulnerability, buffer overflows remain a real threat,
especially in embedded systems, firmware, and legacy code. They can lead to remote code execution,
crashes, or full system compromise when exploited, potentially allowing attackers to take full control
of the system.
Insecure deserialization
Insecure deserialization is when an application accepts serialized data like JSON, XML, or
binary objects and converts it into code or objects without proper validation. If an attacker modifies
that data, they can inject malicious code, escalate privileges, or trigger remote code execution during
deserialization.
Because serialization is used behind the scenes in many frameworks, insecure deserialization
is often overlooked—yet it remains one of the most powerful and dangerous software security
vulnerabilities.
SQL injection
SQL Injection (SQLi) remains one of the most widely exploited software vulnerabilities. It‘s
dangerous because it often enables attackers to extract confidential information, escalate privileges, or
gain full administrative control, especially in systems lacking proper input validation and privilege
controls.
Despite widespread awareness, SQL injection is still common in 2025 due to legacy
codebases, insecure development practices, and inconsistent input validation in many web
applications.
Cross-site scripting (XSS) occurs when an attacker injects malicious JavaScript into a web page,
which then executes in another user‘s browser. It‘s used to impersonate users, deliver malware, or
exploit browser extensions. XSS typically targets web apps that fail to properly handle user input in
HTML or JavaScript contexts. This can lead to session hijacking, cookie theft, user redirection, or a
spoofed interface that appears to come from a trusted source.
Broken access control occurs when an application fails to properly enforce restrictions on what
authenticated users are allowed to do. These flaws can result in unauthorized access to data, actions,
or system functionality. They often stem from misconfigured permissions, missing authorization
logic, or predictable object references (e.g., userId=123 in a URL). Common examples include:
Insecure APIs
As apps become increasingly API-first, insecure endpoints can serve as backdoors to otherwise
protected systems, leading to unauthorized access, data leaks, or service disruption. APIs are prime
targets for attackers due to their access to large volumes of sensitive information, lack of
documentation, and reliance on open-source components with known vulnerabilities.
This category covers flaws in how users are identified and authenticated, such as weak login
mechanisms, missing multi-factor authentication (MFA), exposed session tokens, or poor password
policies. These failures frequently lead to credential stuffing, brute-force attacks, or session hijacking.
Software and data integrity failures occur when code, configuration, or update mechanisms are
susceptible to tampering. These vulnerabilities are part of supply chain attacks where trust in open-
source packages, CI/CD workflows, or updates is exploited. Examples include insecure package
downloads, unverified third-party dependencies, or unsigned updates that are deployed regardless.
Cryptographic failures
Cryptographic failures or ―sensitive data exposure‖ occur when sensitive data isn‘t properly protected
in transit or at rest. It differs from missing encryption in that these issues usually stem from how
cryptography is applied, managed, or integrated. Common examples include using broken or outdated
algorithms like SHA-1 or MD5 for hashing passwords, storing API tokens in plain text, or hardcoding
cryptographic keys directly into source code.
Server-side request forgery (SSRF) happens when an attacker tricks a server into making
unauthorized HTTP requests (often to internal services) by submitting a malicious or user-controlled
Unlike broader API flaws, SSRF is network-oriented. It exploits the trust that backend systems place
in each other, not in external callers.
Cryptography
Cryptographic systems are characterized along three independent dimensions:
1. The type of operations used for transforming plaintext to ciphertext. Mention two requirements for
secure conventional [Link] encryption algorithms are based on two general principles:
substitution, inwhich each element in the plaintext (bit, letter, group of bits or letters)
ismapped into another element, and transposition, in which elements in the plaintext are
rearranged. The fundamental requirement is that no information be lost.
Cryptanalysis:
Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general
characteristics of the plaintext.
Brute-force attack: The attacker tries every possible key on a piece of ciphertext until an intelligible
translation into plaintext is obtained. On average, half of all possible keys must be tried to
achieve success.
An encryption scheme is unconditionally secureif the ciphertext generated by the scheme does not
contain enough information to determine uniquely the corresponding plaintext, no matter how
much ciphertext is available.
The cost of breaking the cipher exceeds the value of the encrypted information.
The time required to break the cipher exceeds the useful lifetime of the information. An encryption
scheme is said to be computationally secureif either of the foregoing two criteria are met.
Substitution Techniques:
The two basic building blocks of all encryption techniques are substitution and transposition.
A substitution technique is one in which the letters of plaintext are replaced by other letters or by
numbers or symbols.
Caesar Cipher: The Caesar cipher involves replacing each letter of the alphabet with the letter
standing three places further down the alphabet.
For example, plain: meet me after the toga party
cipher: PHHW PH DIWHU WKH WRJD SDUWB
C = E(3,p)= (p + 3) mod 26
C = E(k,p) = (p + k) mod 26, p=D(k,C) mod 26
Three important characteristics of this problem enabled us to use a brute-force cryptanalysis:
1. The encryption and decryption algorithms are known.
2. There are only 25 keys to try.
3. The language of the plaintext is known and easily recognizable.
Monoalphabetic Ciphers:
If, instead, the "cipher" line can be any permutation of the 26 alphabetic characters, then there are 26!
Possible keys. This is referred to as a monoalphabetic substitution cipher, because a single
cipher alphabet (mapping from plain alphabet to cipher alphabet) is used per message.
Repeating plaintext letters that are in the same pair are separated with a filler letter, such as x, so that
balloon would be treated as ba lx lo on.
Two plaintext letters that fall in the same row of the matrix are each replaced by the letter to the
right, with the first element of the row circularly following the last. For example, ar is
encrypted as RM.
Two plaintext letters that fall in the same column are each replaced by the letter beneath, with
the top element of the column circularly following the last. mu is encrypted as CM.
Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and
the column occupied by the other plaintext letter. Thus, hs becomes BP and ea becomes IM
(or JM, as the encipherer wishes)
Polyalphabetic Ciphers:
To encrypt a message, a key is needed that is as long as the message. Usually, the key is a repeating
keyword. For example, if the keyword is deceptive, the message "we are discovered save yourself"
is encrypted as follows:
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
Decryption is equally simple. The key letter again identifies the row. The position of the ciphertext letter in
that row determines the column, and the plaintext letter is at the top of that column.
Steganography:
Character marking: Selected letters of printed or typewritten text are overwritten in pencil. The marks
are ordinarily not visible unless the paper is held at an angle to bright light.
Invisible ink: A number of substances can be used for writing but leaveno visible trace until heat or
some chemical is applied to the paper.
Pin punctures: Small pin punctures on selected letters are ordinarily not visible unless the paper is
held up in front of a light.
Typewriter correction ribbon: Used between lines typedwith a black ribbon, the results of typing with
the correction tape are visible only under a strong light