Cyber Security

July 7, 2016 | Author: HukmiRulaniya | Category: Types, School Work
Share Embed Donate


Short Description

its ppt for cyber security...

Description

CYBER SECURITY CREATED BY:

NIRANJAN 1120158

CONTENTS Security Breaches Cyber Security Brute-Force

Hacking Techniques Cryptography Honey Encryption NNNKP

SECURITY BREACHES  Yahoo! Mail (communications). The e-mail service for 273 million users was reportedly hacked in January

 Google (communications) About 5 million gmail userid passwords got hacked  Apple iCloud (technology). Hackers used passwords hacked with brute-force tactics and third-party applications to access Apple users online data storage NNNKP

SECURITY BREACHES  Breaches due to unencrypted data transfer

You Can Get Hacked Just By Watching This Cat Video on YouTube

NNNKP

NNNKP

CRYPTOGRAPHY  Cryptography means hidden or secret writing  It is the mathematical “scrambling” of data

NNNKP

CLASSICAL CRYPTOGRAPHY

* Transposition Ciphers

*Substitution Ciphers

HELLO WORLD

‘ FLY AT ONCE ‘

EHLOL OWRDL

‘GMZ BU PODF'

NNNKP

MODERN CRYPTOGRAPHY

 Symmetric Cryptography

NNNKP

ASYMMETRIC CRYPTOGRAPHY

NNNKP

HASHING  Hash functions are also commonly employed by many operating systems to encrypt passwords  It is 1-WAY encryption

NNNKP

PHISHING PAGE CREATION

Copy source code

Alter destination of login details

Upload the page on a hosting site

Login details used Save to new destn.

PHISHING page opens

Click on hosted page url

NNNKP

BRUTE-FORCE ATTACK  In cryptography, a brute-force attack is a cryptanalytic attack that can, in theory, be used against any encrypted data  It consists of systematically checking all possible keys or passwords until the correct one is found  Certain types of encryption, by their mathematical properties, cannot be defeated by brute force. An example of this is  one-time pad cryptography  Brutus, rainbowcrack, cain n abel

NNNKP

Charset file name Charset string Example 0-9.pcf 0123456789 666929 1-13.pcf 0x1 ... 0xd   a-z.pcf abcdefghijklmnopqr qwerty stuvwxyz a-z, 0-9.pcf abcdefghijklmnopqr asd123 stuvwxyz01234567 89 a-z, 0-9, abcdefghijklmnopqr a#q1*9 symbol14.pcf stuvwxyz01234567 89!@#$%^&*()_+= a-z, A-Z.pcf ABCDEFGHIJKLMNO QWErty PQRSTUVWXYZabcd efghijklmnopqrstuv wxyz a-z, A-Z, 0-9.pcf ABCDEFGHIJKLMNO Asd123 PQRSTUVWXYZabcd efghijklmnopqrstuv wxyz 0123456789 a-z, A-Z, 0-9, abcdefghijklmnopqr As12#$ symbol14.pcf stuvwxyzABCDEFG HIJKLMNOPQRSTUV WXYZ 0123456789! @#$%^&*()-_+= all.pcf ABCDEFGHIJKLMNO Aa1@|} PQRSTUVWXYZabcd efghijklmnopqrstuv wxyz 0123456789!\"#$ %&'()*+,-./:;? @[\\]^_`{|}~";

Total passwords 1 111 110 5 229 042 321 272 406

Timing 1 sec 5 sec 5 min

2 238 976 116

37 min

15 943 877 550

4.5 hrs

20 158 268 676

5,5 hrs

57 731 386 986

16 hrs

195 269 260 956

2 days, 6 hrs

742 912 017 120

8 days, 15 hrs

NNNKP

BRUTE-FORCE ATTACK PROCEDURE

Set address of target

Type of target /port

Positive match found

Upload Username & password list

Start contacting server

NNNKP

NNNKP

PASSWORD SELECTION

Nkp{@$}#5

ABCDefghijklmnopqrstuv wx NNNKP

HONEY ENCRYPTION  Encryption for which decrypting a ciphertext with any number of *wrong* keys yields fake, but plausible, plaintexts  Developers: Ari Juels, Thomas Ristenpart  If an attacker used software to make 10,000 attempts to decrypt a credit card number, for example, they would get back 10,000 different fake credit card numbers  Protect the data stored by password manager services such as LastPass and Dashlane NNNKP

MODERN ENCRYPTION TECHNIQUE pw M

ENCRYPT

C, Salt

M1 = $&%ff1 31f^ decrypt M2 = hgjk!alc&ewj M3 = copenhagen

Invalid ascii bytes are neglecte d

HONEY ENCRYPTION TECHNIQUE pw pK a

ENCRYPT

Authentication protocol

C, Salt

M1 = 101010101 decrypt M2 = 100111010 M3 = 010101011

All msg bytes are plausible

Public‐key for client stored only at server NNNKP

HONEY ENCRYPTION PROCEDURE

NNNKP

REFEREN CES

http://resources.infosecinstitute.com/honey-encryption/ http://www.howtogeek.com/166832/brute-force-attacks

http://www.cryptography.com/ http://bristolcrypto.blogspot.in/2014/02/honey-encryption.html http://technav.ieee.org/tag/2706/data-encryption http://www.infosecurity-magazine.com/

H T

N A

U O Y K

NNNKP

S IE

R E U ? Q ?? ? ? ?

NNNKP

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF