COMP522

Privacy & Security

  • Privacy is the ability of a person to control the availability of information about and exposure of him- or herself. It is related to being able to function in society anonymously. (Wikipedia)

  • Security is a condition that results from establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.

  • HNDL: Harvest Now | Decrypt Later

What can hackers do with my information?

  • Sell your data to other hackers
  • Identify thief

Cryptography & steganography

  • Ubfirnarion hiding: steganography & digital watermarking, Steganalysis & Cryptanalysis
  • Cryptography for secrecym for signing, etc;
  • Symmetric key and asymmetric key protocols;
  • Applications, e.g encryption,.
  • Cryptographic protocols

Identification, authentication, authorisation

  • Identification: associating an identity with a subject.

Authentication

Authentication: establishing the validity of something, such as an identity.

  • Authentication is the process of verifying the identity of a user, device or other entity in a computer system, often as a prerequisite to allowing access to resources in the system.

  • Authentication is used for the purpose of performing trusted communications between parties for computing and telecommunications applications.

  • Authentication techniques

    • Passwords what you know
      • Problems:
        • short memorable password can be guessed or searched by attacker
        • long and random password is difficult to remember
    • Tokens what you have
      • Physical token (identity token, security token) is physical device which perform or help authentication
      • Problems:
        • The token doesnt really “prove” who an owner of the token is- any body who has possession of the token can gain access
        • If the token is lost, the owner can not have an ccess, despite his/her identity has not changed
        • Some tokens may be easily copied or forged
    • Biometrics who you are
  • Authorisation: associating rights or capabilities with a subject.

Multi-factor authentication techniques

To increase security in some applications tokens are combined with other means of identification, such a passwords (PINs).

Biometrics-based techniques

A biometric is a feature measured from the human body that is distinguishing enough to be used for user authentication