Security Intrusion


BASICS

LOCKING DEFINITIONS

PROTECTION OBJECTS

CODE SECURITY

ENCRYPTION

ASYMMETRIC ENCRYPTION

OS OVERVIEW

NETWORK


BASICS:

Encryption has been used for many years to prevent unwanted access to information. Many such systems have been considered unbreakable - still weaknesses have made decryption (also called deciphering) possible.

The existing theory has been built around the typical military situation - two persons are working together at a distance, the intruder is listening and can see the transmitted (encrypted) data. For security of mass-produced and widespread items, the situation is somewhat different.

The following notes are from a lecture held by Hans K. Pedersen, CEO and co-founder of Link Data Security.

intru1.gif

Traditional military:

Only sender and recipient have key. Recipient is your ally.

Public key:

Only recipient has private key. Recipient is your ally.

Secure mass distribution:

Intruder can get key. Recipient may be your enemy.

We want to prevent

   Theft
   Unauthorized access
   Use beyond intended amount/timeframe 
   Disassembly/publication
   Modifications

Without

   Restricting the legal user too much.


LOCKING DEFINITIONS:

intru2.gif

OBJECT:

Item that is access or theft protected.

LOCK:

Limits or blocks object if key is not present.

FIX POINT:

Anchor point that object is locked to.

KEY:

Portable unlocking condition – can be a code.

Three types of protection:

Access control:

Limits  WHO can use the object or to what degree it can be used. Note: Not necessarily any fix point.

Pirate control:

Secures  WHERE the object can be used –
namely at the fix point.

License control:

Ensures proper payment to the publisher in relation to WHAT is being used (click price, time limitation, module price, no. of machines, no. of users).

Objects:

intru3.gif

Keys:

intru4.gif

Fix Points:


PROTECTION OBJECTS:

Definitions:

DATA:

Any collection of binary numbers

Installation:

Process which activates Program or Data.

Program:

Binary numbers understood by the CPU as
instructions (i.e. an executable program).

Data:

Digital information, such as text or graphics.

lnstallation protection:

The installation process is locked to a key. In other words the installation program is protected. After installation, the application is usually unprotected, but another and safer approach is that the main program remains protected and locked to the machine it was installed to.

Program protection:

One of the program modules is protected. This process involves three things: