Professional Documents
Culture Documents
Information Security
Information Security
TECHNIQUES
INFORMATION SECURITY
BS_CS 6TH 2
MULTI-LEVEL SECURITY (MLS)
4
MANDATORY ACCESS CONTROL(MAC)
5
WHAT IS A SECURITY MODEL?
6
BELL-LAPADULA MODEL(BLP): A MAC MODEL FOR ACHIEVING
MULTI-LEVEL SECURITY
Introduce in 1973
Air-Force was concerned with security in time-sharing systems
Many OS bugs
Accidental misuse
Main Objective:
Enable one to formally show that a computer system can securely process classified
information
7
THE BLP SECURITY MODEL
8
ELEMENTS OF THE BLP MODEL
Lm: Max Lc: Current L: Class.
Sec. Level Sec. Level Level
Subjects Objects
Current
Accesses
Trusted
Subjects
Access Matrix 9
10
BASIC TERMINOLOGY
11
Deciphering or decryption: recovering plaintext from ciphertext
12
Cipher or cryptographic system : a scheme for encryption and decryption
13
Cryptography
Basics
Algorithms in which the key for encryption and decryption are the same are
Symmetric
Example: Caesar Cipher
Types:
1. Block Ciphers
– Encrypt data one block at a time (typically 64 bits, or 128 bits)
– Used for a single message
2. Stream Ciphers
– Encrypt data one bit or one byte at a time
– Used if data is a constant stream of information
SYMMETRIC ENCRYPTION
17
Encryption
Cipher
Key A Key B
20
SYMMETRIC ENCRYPTION
Mathematically:
Y = EK(X) or Y = E(K, X)
X = DK(Y) or X = D(K, Y)
X = plaintext
Y = ciphertext
K = secret key
E = encryption algorithm
D = decryption algorithm
Both E and D are known to public
21