What means that it should be possible for the receiver of a message to verify that the message has not been changed in any manner?

If you see a question mark next to the sender's name, the message isn't authenticated. When an email isn't authenticated, that means Gmail doesn't know if the message is coming from the person who appears to be sending it. If you see this, be careful about replying or downloading any attachments.

Check if a message is authenticated

Important: Messages that aren't authenticated aren't necessarily spam. Sometimes authentication doesn't work for real organizations who send mail to big groups, like messages sent to mailing lists.

Check Gmail messages

  1. On your Android phone or tablet, open the Gmail app 
    What means that it should be possible for the receiver of a message to verify that the message has not been changed in any manner?
    .
  2. Open an email.
  3. Tap View details
    What means that it should be possible for the receiver of a message to verify that the message has not been changed in any manner?
    View security details.
  4. The message is authenticated if you see:
  • "Mailed by" header with the domain name, like google.com.
  • "Signed by" header with the sending domain.

The message isn't authenticated if you see a question mark next to the sender's name. If you see this, be careful about replying or downloading any attachments.

Fix messages that aren't authenticated

A message I received wasn't authenticated

If a message you get from a trusted source isn't authenticated, contact the person or company who sent you the email. When you contact them, provide a link to this help page so they can learn how to authenticate their messages.

A message I sent from my domain wasn't authenticated

If a message you sent arrived with a question mark "?" next to your email address, the message wasn't authenticated.

Messages must be authenticated to make sure they're classified correctly. Also, unauthenticated messages are very likely to get rejected. Because spammers can also authenticate mail, authentication by itself isn't enough to guarantee your messages can be delivered.

Fix messages that aren't authenticated

Make sure messages you sent are authenticated using DKIM (preferred) or SPF.

You can use these steps to prevent your emails from being blocked by Gmail:

  • Use RSA keys that are at least 1024-bits long. Emails signed with less than 1024-bit keys are considered unsigned and can easily be spoofed.
  • Gmail combines user reports and other signals, with authentication information, when classifying messages. Authentication is mandatory for every mail sender to ensure that your messages are correctly classified. 
  • Learn how to create a policy to help control unauthenticated mail from your domain.

Was this helpful?

How can we improve it?

Crowdsensing and Privacy in Smart City Applications

Raj Gaire, ... Surya Nepal, in Smart Cities Cybersecurity and Privacy, 2019

3.5.2 Cryptography

Cryptographic techniques are used to ensure secrecy and integrity of data in the presence of an adversary. Based on the security needs and the threats involved, various cryptographic methods such as symmetric key cryptography or public key cryptography can be used during transportation and storage of the data. In addition, a homomorphic encryption allows various computations to take place on encrypted data without requiring the data to be decrypted for processing. From the privacy perspective, these techniques are useful to protect personal information from being leaked during transportation and from storage servers [31].

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128150320000056

Microsoft Vista: Securing User Access

In Microsoft Vista for IT Security Professionals, 2007

Using Encryption

Cryptography is a word derived from the Greek kryptos (“hidden”), and the use of cryptography predates the computer age by hundreds of years. Keeping secrets has long been a concern of human beings, and the purpose of cryptography is to hide information or change it so that it is incomprehensible to people for whom it is not intended. Cryptographic techniques are an important part of a multilayered security plan. Some security measures, such as implementation of a firewall and use of access permissions, attempt to keep intruders out of the network or computer altogether, much like fences and door locks attempt to keep burglars off the grounds or out of the house. Cryptography provides an inner line of defense. Like a wall safe that is there in case the burglars do make it inside your house—and to protect valuables from people who are authorized to come into your house—cryptography protects data from intruders who are able to penetrate the outer network defenses and from those who are authorized to access the network but not this particular data.

Cryptographic techniques concern themselves with three basic purposes:

Authentication Verifying the identity of a user or computer.

Confidentiality Keeping the contents of the data secret.

Integrity Ensuring that data doesn’t change between the time it leaves the source and the time it reaches its destination.

One or more of these goals may be a priority, depending upon the situation.

All three mechanisms can be used together, or they can be used separately when only one or two of these considerations are important. In the following sections, we look more closely at how each one works in relation to network security.

Note

The process of confidentiality, integrity, and authentication, is also known as CIA.

Cryptographic techniques include encryption, which involves applying a procedure called an algorithm to plain text to turn it into something that will appear to be gibberish to anyone who doesn’t have the key to decrypt it. Encryption is a form of cryptography that “scrambles” plain text into unintelligible cipher text. Encryption is the foundation of such security measures as digital signatures, digital certificates, and the public key infrastructure that uses these technologies to make computer transactions more secure. Computer-based encryption techniques use keys to encrypt and decrypt data. A key is a variable (sometimes represented as a password) that is a large binary number—the larger, the better. Key length is measured in bits, and the more bits in a key, the more difficult the key will be to “crack.”

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491396500078

Understanding Cybercrime Prevention

Littlejohn Shinder, Michael Cross, in Scene of the Cybercrime (Second Edition), 2008

Understanding the Purposes of Cryptographic Security

Cryptographic techniques are an important part of a multilayered security plan. Some security measures, such as implementation of a firewall and use of access permissions, attempt to keep intruders out of the network or computer altogether, much like fences and door locks attempt to keep burglars off the grounds or out of the house. Cryptography provides an inner line of defense. Like a wall safe that is there in case the burglars do make it inside your house—and to protect valuables from people who are authorized to come into your house—cryptography protects data from intruders who are able to penetrate the outer network defenses and from those who are authorized to access the network but not this particular data.

Cryptographic techniques concern themselves with three basic purposes:

Authentication Verifying the identity of a user or computer

Confidentiality Keeping the contents of the data secret

Integrity Ensuring that data doesn't change between the time it leaves the source and the time it reaches its destination

One or more of these goals may be a priority, depending on the situation. For example, if an investigator receives a message from his or her chief to fly to the West Coast to interview a witness in a case, the overriding concern might be to know that it was, indeed, the chief of police who sent the message and not a fellow officer playing a practical joke. In this case, authentication of the message sender's identity is of utmost importance. If the case relates to an internal affairs investigation and it is important that no one else in the department know where the investigator is going, confidentiality of the data might be important as well. And if the message states that the investigator is authorized to spend $3,000 on the trip, it might be important to ensure that the message has not been changed (after all, chiefs are not usually this generous) in transit—in other words, that the message's integrity has not been compromised.

All three mechanisms can be used together, or they can be used separately when only one or two of these considerations are important. In the following sections, we look more closely at how each one works in relation to network security.

On the Scene

A Historical Perspective on Cryptography

Cryptography has probably been around for almost as long as written language. According to A Short History of Cryptography, by Fred Cohen (www.all.net/books/ip/Chap2-1.html), the study of cryptography has been around for 4,000 years or more. Whenever communications are recorded, the issue of protecting those recorded communications arises.

In both business and personal communications, it is often not desirable to share the contents with everyone—in fact, in many cases doing so could have disastrous results. Thus, early civilizations looked for ways to conceal the contents of messages from prying eyes. In ancient Egypt, deviations on the hieroglyphic language in use were developed for that purpose. The Greeks used a “transposition code” in which each letter of the alphabet was represented by another that indicated where, in a grid, the original letter was located. In early India, spies employed by the government used phonetic-based “substitution codes” (the same concept children use for pig Latin). In biblical times, a substitution cipher called atbash, which worked by replacing the last letter of the Hebrew alphabet with the first and so on, was used to encrypt writings. Encryption methods were used by such diverse historical figures as Julius Caesar (after whom the “Caesar cipher” was named), Thomas Jefferson (who invented the cipher wheel), and Sir Francis Bacon. Governments have long used encryption to protect sensitive military messages.

Authenticating Identity

As we discussed in Chapter 11, you can determine the identity of a user or computer in numerous ways, but it generally requires that the user provide something that is associated with his or her user account that someone else could not easily provide. The requested credential is generally one (or more) of the following:

Something you know, such as a password or personal identification number (PIN)

Something you have, such as a smart card or certificate

Something you are, in which biometric devices are used to identify you on the basis of your physical characteristics

Because none of these authentication methods (or any other) is absolutely foolproof, it makes sense in a high-security environment to use a multifactor authentication system (sometimes called two-way or three-way authentication, depending on the number of authentication methods used) by combining two or more of them. That is, a user is required to provide both something he or she has and something he or she knows (in fact, most smart card implementations require that the user not only insert the card in a reader, but also enter a PIN), or the user must both undergo a biometric scan and provide a password before being granted access.

Another method of implementation is layered authentication, in which one form of authentication is accepted to provide a lower level of access, and additional authentication is required for a higher level of access.

Note

Some security literature mentions a fourth means of proving identity: something you do. An example would be a sample of your handwriting. Voice prints might also be considered to be in this category.

As we saw in Chapter 11, a wide number of protocols are used for authenticating users on a network, many of which use various types of encryption to ensure that the data being passed by the user to the authentication server can't be intercepted and viewed by others. Some of these protocols include:

Kerberos A logon authentication protocol that is based on secret key (symmetric) cryptography. It usually uses the Data Encryption Standard (DES) or Triple-DES (3DES) algorithm, although with the latest version, Kerberos Version 5, algorithms other than DES can be used. Kerberos uses a system of “tickets” to provide verification of identity to multiple servers throughout the network. This system works a little like the payment system at some amusement parks and fairs where, instead of paying to ride each ride, customers must buy tickets at a central location and then use those tickets to access the rides. Similarly, with Kerberos, a client who wants to access resources on network servers is not authenticated by each server; instead, all the servers rely on “tickets” issued by a central server, called the Key Distribution Center (KDC). The client sends a request for a ticket (encrypted with the client's key) to the KDC. The KDC issues a ticket called a Ticket-Granting Ticket (TGT), which is encrypted and submitted to the Ticket-Granting Service (TGS). The TGS can be running on the same physical machine that is running the KDC. The TGS issues a session ticket to the client for accessing the particular network resource that was requested (which is usually on a different server). The session ticket is presented to the server that hosts the resource, and access is granted. The session key is valid only for that particular session and is set to expire after a specific amount of time. Kerberos allows mutual authentication; that is, the identities of both the client and the server can be verified.

NT LAN Manager (NTLM) Another Microsoft logon authentication method. Unlike Kerberos, with NTLM, when a client wants to access a server's resources, that server must contact the domain controller to have the client's identity verified. It uses MD4/MD5 hashing algorithms and DES encryption.

Shiva Password Authentication Protocol (S-PAP) A remote access authentication protocol used for Point-to-Point Protocol (PPP) or dial-up connections. Shiva PAP (S-PAP) uses a two-way reversible authentication method that encrypts passwords so that they will not be subject to interception and misuse.

Challenge Handshake Authentication Protocol (CHAP) Uses a hashing algorithm and a shared secret (more about that later in this chapter, in the section on encryption) to protect the password. CHAP provides more security than PAP. Microsoft developed its own version of the protocol, called MS-CHAP, which uses the DES encryption algorithm and LM/NTHASH.

The Remote Authentication Dial-In User Service (RADIUS) Also used for authenticating remote connections. Exchanges are encrypted using a shared key, and multiple RAD-IUS servers can communicate with each other and exchange authentication information.

Secure Shell (SSH) Allows users to log on to UNIX systems remotely. When using SSH, both ends of the connection (client and server) are authenticated, and data (including passwords) can be encrypted. 3DES, Blowfish, and Twofish are encryption algorithms that are supported by SSHv2, which also allows the use of smart cards.

A concept that is closely related to authentication is nonrepudiation. This is a means of ensuring that whoever sends a message cannot later claim that he or she didn't send it. Nonrepudiation is sometimes considered to be a fourth, separate purpose of cryptography, but we include it here in the discussion of authentication because the two concepts go together; nonrepudiation just goes a step further than authentication.

Providing Confidentiality of Data

Confidentiality refers to any method that keeps the contents of the data secret. Usually this means encrypting it to prevent unauthorized persons from understanding what the data says even if they intercept it. In a high-security environment, where network communications necessarily involve information that should not be shared with the world, it is important to use strong encryption to protect the confidentiality of sensitive data. We discuss exactly how that is done in the upcoming “Basic Cryptography Concepts” section.

Ensuring Data Integrity

Data integrity, in the context of cryptography, means that there is a way to verify that the data was not changed after it left the sender, that the data that was sent is exactly the same as the data that is received at the final destination. It is essential to be able to count on data integrity in network transactions such as e-commerce.

Note

The term data integrity has a broader meaning in terms of general computing and networking than it does in the context of cryptography. In this sense, it refers to protection of data from damage or destruction; the integrity of data can be threatened by a power surge, a magnetic field, fire, flood, or the like as well as by persons who would deliberately modify it. You can install utilities such as Tripwire (www.tripwire.org) to monitor changes to system data on the hard disk.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492768000121

MCSE 70-293: Planning, Implementing, and Maintaining Internet Protocol Security

Martin Grasdal, ... Dr.Thomas W. ShinderTechnical Editor, in MCSE (Exam 70-293) Study Guide, 2003

Purposes of Encryption

IPSec functions by using cryptographic techniques. The term cryptography refers to methods of making data unreadable or undecipherable by anyone except the authorized recipient in the event that the message is intercepted by someone else. IPSec uses cryptography to provide three basic services:

Authentication

Data integrity

Data confidentiality

There are times when only one or two of these services is needed, and other times when all of these services are needed. We will take a look at each of these services individually.

Head of the Class…

IPSec Encryption Algorithms

IPSec provides computer-level authentication, as well as data encryption, for virtual private network (VPN) connections that use the Layer Two Tunneling Protocol (L2TP). One important purpose of IPSec encryption is to provide for data confidentiality so that the messages that travel through the VPN tunnel cannot be read by unauthorized persons. This is the “private” part of virtual private networking.

Before an L2TP connection is established, IPSec is negotiated between the client computer and the VPN server that uses L2TP. When the negotiation is completed, the data and the password are secure. One point of negotiation is the encryption algorithm that will be used. Windows Server 2003 supports the following encryption algorithms:

Data Encryption Standard (DES) This method uses a single 56-bit key encryption level.

Triple Data Encryption Standard (3DES) This method uses three 56-bit keys for encryption.

In today’s security-conscious environments, most servers are set to allow encryption and allow the client machines to select their encryption methods (algorithms). You can also set the server settings to deny encryption, select the specific encryption strength, or allow the client computer to select the encryption strength. Data encryption is very important if you want to ensure that your data is not readable in the event that it is captured by a “sniffer” or otherwise intercepted as it travels across the network.

Authentication

Authentication is the process of verifying the identity of a data sender or recipient. This allows the message recipient to know that the message was actually sent from the sender and not from someone posing as the sender. IPSec can use different methods to authenticate identities, including pre-shared keys, digital certificates, and Kerberos authentication. Authentication is needed when it is important to verify that a message came from the person who claims to have sent it.

A concept closely related to authentication is nonrepudiation, which refers to a way of ensuring that the sender cannot later deny sending the message.

IPSec can also provide anti-replay. This refers to ensuring that an unauthorized person cannot capture the authentication credentials as they’re sent across the network and “replay” them to establish a communications session with the server.

What means that it should be possible for the receiver of a message to verify that the message has not been changed in any manner?
NOTE

The use of pre-shared keys is not recommended, because it is the least secure of the authentication methods supported by Windows Server 2003 IPSec. The biggest problem with any shared secret such as a pre-shared key is the difficulty of sharing the key with both parties without compromising it.

Data Integrity

Data integrity refers to the ability to ensure that the data that is received at the endpoint of the communication is exactly the same data that was sent from the originating computer, and it has not been modified in any way in transit. IPSec uses the hash functions to ensure that the contents of the data packet have not changed between the time it was sent and the time it was received.

Head of the Class…

Hashing and Hash Algorithms

A hash algorithm used for encryption is a mathematical calculation that has been proven to be one-way so that it cannot be reverse-engineered (discovery of the original message using the hash result). (Two-way hashes are sometimes used for purposes other than encryption.) The result of the application of the algorithm is called the hash result.

Hashing uses a secret key to create a message digest, which is a combination of the message itself and the hash result. The message digest is sent to the recipient, and the same key is applied to it. The recipient applies the same key to the message, and the result will be identical if there has been no alteration.

The Message Digest 5 (MD-5) and Secure Hash Algorithm (SHA) algorithms are two popular hashing algorithms.

Data Confidentiality

Data confidentiality refers to the ability to “scramble” the data using encryption algorithms so that it cannot be understood by an unauthorized person who intercepts it. IPSec provides data confidentiality only through the ESP protocol. AH does not provide for encryption of the data. ESP uses the 3DES and DES algorithms to ensure data confidentiality.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836937500142

Satellite Encryption

Daniel S. Soper, in Computer and Information Security Handbook (Third Edition), 2013

Protecting a transmission that is being sent to a satellite from at or near the surface of Earth requires much more than just cryptographic techniques; to wit, encrypting the message itself is a necessary but insufficient condition for protecting the transmission. The reason for this is that the actual transmission of the encrypted message to the satellite is but the final step in a long chain of custody that begins when the message is created and ends when the message is successfully received by the satellite. Along the way, the message may pass through many people, systems, or networks, the control of which may or may not reside entirely in the hands of the sender. If one assumes that the confidentiality and integrity of the message have not been compromised as the message has passed through all of these intermediaries, then but two primary security concerns remain: the directional accuracy of the transmitting antenna, and the method used to encrypt the message. In the case of the former, the transmitting antenna must be sufficiently well-focused to allow the signal to be received by—and ideally only by—the target satellite. With thousands of satellites in orbit, a strong potential exists for a poorly focused transmission to be intercepted by another satellite, in which case the only remaining line of defense for a message is the strength of the encryption algorithm with which it was encoded. For this reason, a prudent sender should always assume that their message could be intercepted while in transit to and from the satellite, and should implement message encryption accordingly.

When deciding upon which encryption method to use, the sender must simultaneously consider the value of the data being transmitted, the purpose of the transmission, and the technological and computational limitations of the target satellite. A satellite's computational and technological capabilities are a function of its design specifications, its current workload, and any degradation that has occurred since the satellite was placed into orbit. These properties of the satellite can therefore be considered constraints—any encrypted uplink communications must work within the boundaries of these limitations. That said, the purpose of the transmission also features prominently in the choice of which encryption method to use. Here we must distinguish between two types of transmissions: commands, which instruct the satellite to perform one or more specific tasks, and transmissions-in-transit, which are intended to be retransmitted to the surface or to another satellite or spacecraft. Not only are command instructions of high-value, but they are also not typically burdened with the same low-latency requirements of transmissions-in-transit. Command instructions should therefore always be highly encrypted, because control of the satellite could be lost if they were to be intercepted and compromised. What remains, then, are transmissions-in-transit, which may be of either high-value, or of low-value. One of the basic tenants of cryptography states that the value of the data should dictate the extent to which the data are protected. As such, minimal encryption may be acceptable for low-value transmissions-in-transit. For such transmissions, adding an unnecessarily complex layer of encryption may increase the computational burden on the satellite, which in turn may delay message delivery and limit the satellite's ability to perform other tasks simultaneously. High-value transmissions-in-transit should be protected with a robust encryption scheme that reflects the value of the data being transmitted. The extent to which a highly encrypted transmission-in-transit will negatively impact a satellite's available resources depends upon whether or not the message needs to be processed before being retransmitted. If the message is simply being relayed through the satellite without any additional processing, then the burden on the satellite's resources may be comparatively small. If, however, a highly encrypted message needs to be processed by the satellite prior to retransmission (if the message needs to be decrypted, processed, and then reencrypted), the burden on the satellite's resources may be substantial. Processing high-value, highly encrypted transmissions-in-transit may therefore vastly reduce a satellite's throughput capabilities when considered in conjunction with its technological and computational limitations.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128038437000478

Satellite Encryption

Daniel S. Soper, in Computer and Information Security Handbook (Second Edition), 2013

Protecting a transmission that is being sent to a satellite from at or near the surface of the Earth requires much more than just cryptographic techniques; to wit, encrypting the message itself is a necessary but insufficient condition for protecting the transmission. The reason for this is that the actual transmission of the encrypted message to the satellite is but the final step in a long chain of custody that begins when the message is created and ends when the message is successfully received by the satellite. Along the way, the message may pass through many people, systems, or networks, the control of which may or may not reside entirely in the hands of the sender. If one assumes that the confidentiality and integrity of the message have not been compromised as the message has passed through all of these intermediaries, then but two primary security concerns remain: the directional accuracy of the transmitting antenna, and the method used to encrypt the message. In the case of the former, the transmitting antenna must be sufficiently well-focused to allow the signal to be received by – and ideally only by – the target satellite. With thousands of satellites in orbit, a strong potential exists for a poorly focused transmission to be intercepted by another satellite, in which case the only remaining line of defense for a message is the strength of the encryption algorithm with which it was encoded. For this reason, a prudent sender should always assume that their message could be intercepted while in transit to and from the satellite, and should implement message encryption accordingly.

When deciding upon which encryption method to use, the sender must simultaneously consider the value of the data being transmitted, the purpose of the transmission, and the technological and computational limitations of the target satellite. A satellite’s computational and technological capabilities are a function of its design specifications, its current workload, and any degradation that has occurred since the satellite was placed into orbit. These properties of the satellite can therefore be considered constraints – any encrypted uplink communications must work within the boundaries of these limitations. That having been said, the purpose of the transmission also features prominently in the choice of which encryption method to use. Here we must distinguish between two types of transmissions: commands, which instruct the satellite to perform one or more specific tasks, and transmissions-in-transit, which are intended to be retransmitted to the surface or to another satellite or spacecraft. Not only are command instructions of high value, but they are also not typically burdened with the same low-latency requirements of transmissions-in-transit. Command instructions should therefore always be highly encrypted, because control of the satellite could be lost if they were to be intercepted and compromised. What remains, then, are transmissions-in-transit, which may be of either high value, or of low value. One of the basic tenants of cryptography states that the value of the data should dictate the extent to which the data are protected. As such, minimal encryption may be acceptable for low-value transmissions-in-transit. For such transmissions, adding an unnecessarily complex layer of encryption may increase the computational burden on the satellite, which in turn may delay message delivery and limit the satellite’s ability to perform other tasks simultaneously. High-value transmissions-in-transit should be protected with a robust encryption scheme that reflects the value of the data being transmitted. The extent to which a highly encrypted transmission-in-transit will negatively impact a satellite’s available resources depends upon whether or not the message needs to be processed before being retransmitted. If the message is simply being relayed through the satellite without any additional processing, then the burden on the satellite’s resources may be comparatively small. If, however, a highly encrypted message needs to be processed by the satellite prior to retransmission (if the message needs to be decrypted, processed, and then re-encrypted), the burden on the satellite’s resources may be substantial. Processing high-value, highly encrypted transmissions-in-transit may therefore vastly reduce a satellite’s throughput capabilities when considered in conjunction with its technological and computational limitations.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123943972000386

Mobile Wireless Network Security

Michel Barbeau, in Handbook on Securing Cyber-Physical Critical Infrastructure, 2012

Mutual Authentication Using Public Key Infrastructure

An approach for mobile IPv4 registration message origin mutual authentication has been proposed by Sufatrio and Lam [24]. It is a hybrid approach that combines both symmetric key and asymmetric key cryptographic techniques. Public Key Infrastructure (PKI) is involved while the MNs perform solely symmetric key cryptographic operations. A MN assumes that its HA is a trusted server.

Figure 5-14 illustrates the protocol. The MN and its HA share a secret key kMH. The FA and HA have, respectively, a certificate CF and CH. The FA and HA have private keys kF and kH and public keys lF and lH. In step 1, the MN acquires the certificate of the FA through advertisement message m, sent using broadcast on a periodic basis. Let Ek() be a public-key encryption signing function. Let Dk() be a public-key decryption signing function. The advertisement message m is signed using FA's public key, i.e., DkF (m), and is accompanied with FA's certificate CF.

What means that it should be possible for the receiver of a message to verify that the message has not been changed in any manner?

Figure 5-14. Mutual authentication using PKI.

In step 2, the MN sends through the FA a registration request m′, which is signed with the MN to HA secret key kMH. The registration messages contain the nonce of the HA nH, nonce of the MN nM, and a copy of the advertisement received in step 1 from the FA. In step 3, the FA forwards the registration, together with its nonce nF, to the HA.

On receiving the registration request, the HA verifies the novelty of nonce nH and consistency of the signature hkMH( m′). The HA now verifies FA's credentials and signature on behalf of the MN. The HA first validates the FA's certificate CF using the PKI. Then, it checks the consistency of the signature DkF (m) using the encryption function Ek(), that is, we must have ElF(DkF(m)) equal to m. If all these operations succeed, then the HA may return a registration reply to the MN. The reply rep is accompanied with a new HA nonce n′H and the nonce of the MN nM. This triple, denoted as m″, is signed using the HA-MN shared secret key kMH and associated with the FA nonce nF. This new group of three items is denoted as m‴. The final message consists of the trio m‴, signed using HA's public key, i.e., DkH(m), and HA's certificate CH.

On receiving the registration reply, the FA makes sure that the nF contained in step 4 is identical to the nF is step 3. Using the PKI, the FA validates the HA's certificate CH. Afterward, it authenticates the signature DkH(m) using the encryption function Ek(), that is, the equality ElF (DkF(m))=m must hold. The FA forwards the pair m″,hkMH(m″).

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124158153000054

Design of Real-Time Speech Secure Communication over PSTN

WuZhijun , in Information Hiding in Speech Signals for Secure Communication, 2015

9.3.4.4 Hider and Extractor

The technique of information hiding is implemented in SIHT, which mainly focuses on two aspects, secret speech information concealing and public speech information hiding. The latter is necessary and important.

Whereas cryptographic techniques try to conceal the contents of information, information hiding (steganography) goes a bit further: it tries to conceal not only the contents of information, but also its very existence. Two people can communicate covertly by exchanging unclassified messages containing confidential information, but both parties have to take into account the presence of passive, active, or even malicious attackers.

The third person watching the communication should not be able to decide whether the sender is active in the sense that he sends covers containing secret messages rather than covers without additional information. More formally, if an observer has access to a carrier set {c1,⋯,cn} of cover-objects transmitted between both communication parties, he should not be able to decide which cover-object ci contains secret information. Thus, the security of invisible communication lies mainly in the inability to distinguish cover-objects from stego-objects [21,22]2122.

In practice, not all data can be used as cover for secret communication, since the modifications employed in the embedding process should not be visible to anyone who is not involved in the communication process. This fact shows that sufficient redundant data should be contained in the cover for the purpose of being substituted by secret information. As an example, due to measuring errors, any data which are the result of some physical scanning process will contain a stochastic component called noise. Such random artifacts can be used for the submission of secret information. In fact, it turns out that noisy data has more advantageous properties in most steganographic applications.

Obviously a cover should never be used twice, since an attacker who has access to two versions of one cover can easily detect and reconstruct the message. To avoid accidental reuse, both sender and receiver should destroy all covers that already have been used for information transfer.

Some steganographic methods combine traditional cryptography with steganography: the sender encrypts the secret information prior to the embedding process. Clearly, such a combination increases the security of the overall communication process, as it is more difficult for an attacker to detect embedded Cipher text (which itself has a rather random appearance) in a cover. A strong steganographic system, however, does not need prior enciphering [21].

SIHT utilizes a secret key steganography system similar to a symmetric cipher: the sender chooses a cover c and embeds the secret message into c using a secret key k. If the receiver knows the key used in the embedding process, he or she can reverse the process and extract the secret message. Anyone who does not know the secret key should not be able to obtain the evidence of encoded information. Again, the cover c and the stega-objects can be perceptually similar.

A secret key steganography system can be described as a quintuple [153] ∑=〈C,M,K,DK,EK〉 , where C is the set of possible covers, M is the set of secret messages with |C| ≥ |M|, K is the set of secret keys, EK:C × M × K→C and DK:C × K→M with the property that DK(EK(c,m,k), k) = m for all m∈M, c∈C, and k∈K.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128013281000094

Security for Mobile Ad Hoc Networks

Raja Datta, Ningrinla Marchang, in Handbook on Securing Cyber-Physical Critical Infrastructure, 2012

7.9 Conclusions and Future work

In this chapter, we started by giving a brief introduction to mobile ad hoc networks and went on to discuss different security issues in detail. We have discussed the important security attacks and their solutions. As MANETs are resource constrained and cannot use elaborate cryptographic techniques for data encryption and decryption, we have tried to describe some of the key management techniques that can be used in this type of network. A chapter on security of mobile ad hoc networks cannot be complete without discussing the intrusion detection techniques existing in the literature. We thought it will be very useful to describe here the intrusion detection schemes starting from the simple ones to more complex schemes that utilize trust values of nodes. We have also described some interesting collaborative techniques of intrusion detection to complete the chapter. As regards future work, several challenges still remain in this area of securing ad hoc networks as a whole and MANET in particular. One main issue of concern is that the mobile devices are battery-powered and have limited computational resources. Hence, researchers must take this into account while designing security mechanisms. A complete model of all possible attacks would help researchers evaluate the security of their protocol. Such a model would also allow the application of formal methods to verify a security mechanism. Moreover, it would help researchers to design a more complete security solution instead of designing specific security mechanisms for handling specific security attacks. Another challenge is to design security solutions that are not only highly secure but also exhibit high network performance.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124158153000078

Introduction and Historical Background

Nihad Ahmad Hassan, Rami Hijazi, in Data Hiding Techniques in Windows OS, 2017

Summary

In this chapter we began our journey from the past to discover the old cryptographic systems, which played vital roles during wars and in sending diplomatic messages in ancient times. This knowledge is crucial to understand the new encryption techniques and how they work in modern time.

After listing the major cryptographic techniques we talked about steganography, its types, and techniques, and how was implemented in ancient civilizations to the present day.

We also talked briefly about digital watermarking and online anonymity. We postpone our deep discussion of these two subjects to Chapters 3 and 5Chapter 3Chapter 5, respectively.

In Chapter 2 we will begin our practical hiding journey by introducing the reader to many simple techniques that could be used to hide our files in Windows®. So let us begin hiding your secret information!

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128044490000014

What does the receiver of the message do to be able to fully understand the message sent by the source?

The receiver provides feedback, if applicable Lastly, unless it's a one-way communication, the receiver will provide feedback in the form of a reply to the original sender of the message. Feedback provides the recipient with the ability to ensure the sender that their message was properly received and interpreted.

What should be the receiver of the message?

In the communication process, the "receiver" is the listener, reader, or observer—that is, the individual (or the group of individuals) to whom a message is directed. The receiver is also called the "audience" or decoder.

What do you call to the message sent by the receiver in response to the message he received?

Feedback: It is a response by the receiver to the sender's message. Feedback takes place when the receiver responds to the sender's communication with a return message. It helps the sender determine whether the receiver correctly interpreted the message.

How can you determine if your receiver understand your message?

A good way to check what someone has said is to repeat it back to them. Reflecting back means repeating in your own words what you think another what has been said to you. It can also help to build conversations as well as giving the other person the opportunity to clarify what they have said.