Send
Close Add comments:
(status displays here)
Got it! This site "creationpie.com" uses cookies. You consent to this by clicking on "Got it!" or by continuing to use this website. Note: This appears on each machine/browser from which this site is accessed.
Communication security and authentication
1. Communication security and authentication
The classic communication scenario has
A sending a message to
B. Usually,
A is chosen as
Alice who is sending a message to
B who is chosen as
Bob.
The primary security issues that can arise include the following.
eavesdropping
man in the middle attack
spoofing
2. Eavesdropping
The eavesdropper
E is usually chosen as
Eve who may be listening (i.e., eavesdropping). If the message is not secure, Eve will understand the message.
3. He that hath ears
Before the "
children playing music in the marketplace":
Matthew 11:15 He that hath ears to hear, let him hear. [kjv]
ο εχων ωτα ακουετω [gnt]
In the middle of the "
kingdom parables":
13:9 Who hath ears to hear, let him hear. [kjv]
ο εχων ωτα ακουετω [gnt]
Jesus sometimes uses a phrase such as "
he that hath an ear ... hear" . That "
hear" in Greek assumes with "
understanding". Otherwise, some clarification is needed. Jesus appears to use a phrase such as this when there is some deeper meaning that needs to be uncovered - often a play-on-word meaning in Greek. Jesus wants us to "
hear" with our "
ears". The ancient Greek word
"φωνή" ≈ "voice", as in "
phonograph", and comes from
"φως" ≈ "light" and
"νους" ≈ "mind". That is, the "
sound" of a "
voice" is "
light" into the "
mind".
4. Wiretap
A traditional "
wiretap" was a connection to a physical communication line, such as a telegraph or phone line, that allowed someone (e.g., authorities) to listen to conversations.
In modern times, the "
wiretap" idea was extended to wireless communication.
5. Ancient wireless wiretap
2 Kings 6:11 Therefore the heart of the king of Syria was sore troubled for this thing; and he called his servants, and said unto them, Will ye not shew me which of us is for the king of Israel? [kjv]
και εξεκινηθη η ψυχη βασιλεως συριας περι του λογου τουτου και εκαλεσεν τους παιδας αυτου και ειπεν προς αυτους ουκ αναγγελειτε μοι τις προδιδωσιν με βασιλει ισραηλ [lxx]
In 2 Kings 6:11 we read of one of the first "
wiretaps" of the King of Syria. It is a wireless "
wiretap". The king thinks that there is a spy in his headquarters.
6. 2 Kings 6:11
KJV: Therefore the heart of the king of Syria was sore troubled for this thing; and he called his servants, and said unto them, Will ye not shew me which of us is for the king of Israel?
Hebrew: ויסער לב מלך ארם על הדבר הזה ויקרא אל עבדיו ויאמר אליהם הלוא תגידו לי מי משלנו אל מלך ישראל׃
Greek: και εξεκινηθη η ψυχη βασιλεως συριας περι του λογου τουτου και εκαλεσεν τους παιδας αυτου και ειπεν προς αυτους ουκ αναγγελειτε μοι τις προδιδωσιν με βασιλει ισραηλ
7. Wireless spy
2 Kings 6:12 And one of his servants said, None, my lord, O king: but Elisha, the prophet that is in Israel, telleth the king of Israel the words that thou speakest in thy bedchamber. [kjv]
και ειπεν εις των παιδων αυτου ουχι κυριε μου βασιλευ οτι ελισαιε ο προφητης ο εν ισραηλ αναγγελλει τω βασιλει ισραηλ παντας τους λογους ους εαν λαλησης εν τω ταμιειω του κοιτωνος σου [lxx]
The king is told that there is no spy, but that Elisha has a (wireless) "
wiretap" on all his communications - even to his bedroom.
8. 2 Kings 6:12
KJV: And one of his servants said, None, my lord, O king: but Elisha, the prophet that is in Israel, telleth the king of Israel the words that thou speakest in thy bedchamber.
Hebrew: ויאמר אחד מעבדיו לוא אדני המלך כי אלישע הנביא אשר בישראל יגיד למלך ישראל את הדברים אשר תדבר בחדר משכבך׃
Greek: και ειπεν εις των παιδων αυτου ουχι κυριε μου βασιλευ οτι ελισαιε ο προφητης ο εν ισραηλ αναγγελλει τω βασιλει ισραηλ παντας τους λογους ους εαν λαλησης εν τω ταμιειω του κοιτωνος σου
9. Search and seizure
10. 2 Kings 6:13
KJV: And he said, Go and spy where he is, that I may send and fetch him. And it was told him, saying, Behold, he is in Dothan.
Hebrew: ויאמר לכו וראו איכה הוא ואשלח ואקחהו ויגד לו לאמר הנה בדתן׃
Greek: και ειπεν δευτε ιδετε που ουτος και αποστειλας λημψομαι αυτον και ανηγγειλαν αυτω λεγοντες ιδου εν δωθαιμ
11. Man in the middle attack
A
MITM (Man in the Middle) attack has Eve between Alice and Bob such that the message can not only be understood, but changed.
Man in the middle
Meddler in the middle
Person in the middle
Machine in the middle
Monkey in the middle
Monster in the middle
12. Mary Queen of Scots
The historical example a
MITM is that of Mary Queen of Scots in the Tower of London.
Her code was broken and a
MITM attack used to determine the identity of her co-conspirators.
13. Inside attacks
Since it is hard to break secure communications, hacker attacks on computers will try to establish a
MITM attack to steal passwords, credit card numbers, etc. This is usually set up by a phishing attack where the user clicks on a link that creates the
MITM situation on the user's computer.
This is a form of "
inside" attack since security would not allow an outside attack. However, the user can let the enemy (hacker's code) inside by a click at the computer by the user.
14. Impersonation or spoofing
At some point, Eve can impersonate or spoof a message from Alice without Alice doing anything.
This is the primary problem in email phishing attacks where someone pretends to be someone they are not. That is why hackers try to get personal information about people and groups. They can then send messages that appear to be from friends or fellow workers.
15. Facebook
Many times, I have heard someone tell someone else that their Facebook account was "
hacked" and that they need to change their password.
What happened is that someone created a
fake account using their name and then "
spoofed" other accounts to make them think it was another person.
The original account of that person was not "
hacked". A fake account "
spoofed" that person.
16. Authentic authentication
In the security field, the authentication problem is the following. "
How does one know that someone or something (e.g., a computer) is who they claim to be?". That is, are they "
authentic". Are they the "
real McCoy"?
The phrase "
real McCoy", from 1908, is a corruption of "
Scots the real MacKay" from 1856. There are many other explanations or folk etymologies of this phrase.
Three common ways to authenticate are the following.
What they have, such as an ID card.
What they know, such as a password.
What they are, such as a biometric (e.g., fingerprint).
17. Authentic
18. Strongs - usurp authority
- *G831 *1 αὐθεντέω (ow-then-teh'-o) : from a compound of G846 and an obsolete hentes (a worker); to act of oneself, i.e. (figuratively) dominate:--usurp authority over.
- αυθεντειν
- 1 Timothy 2:12 ... a woman to teach, nor to usurp authority over the man, but to be ...
19. Strongs - quietness
- *G2271 *4 ἡσυχία (hay-soo-khee'-ah) : feminine of G2272; (as noun) stillness, i.e. desistance from bustle or language:--quietness, silence.
- ησυχια *2
- 1 Timothy 2:11 Let the woman learn in silence with all subjection.
- 1 Timothy 2:12 ... but to be in silence.
- ησυχιαν
- Acts 22:2 ... to them, they kept the more silence: and he saith,)
- ησυχιας
- 2 Thessalonians 3:12 ... Christ, that with quietness they work, and eat their own bread.
20. Usage - quietness
*G2271 *4 ἡσυχία (hay-soo-khee'-ah) : feminine of G2272; (as noun) stillness, i.e. desistance from bustle or language:--quietness, silence.
|
Words: ησυχια=2 ησυχιαν ησυχιας
|
21. 1 Timothy 2:12
1 Timothy 2:12 But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence. [kjv]
διδασκειν δε γυναικι ουκ επιτρεπω ουδε αυθεντειν ανδρος αλλ ειναι εν ησυχια [gnt]
The ancient Greek word
"ἡσυχία" ≈ "peace, silence, stillness, rest".
*G2271 *4 ἡσυχία (hay-soo-khee'-ah) : feminine of G2272; (as noun) stillness, i.e. desistance from bustle or language:--quietness, silence.
The ancient Greek word
"αὐθεντικός" ≈ "authentic, authoritative".
*G831 *1 αὐθεντέω (ow-then-teh'-o) : from a compound of G846 and an obsolete hentes (a worker); to act of oneself, i.e. (figuratively) dominate:--usurp authority over.
|
Words: αυθεντειν
|
22. 1 Timothy 2:12
KJV: But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence.
Greek: γυναικι δε διδασκειν δε γυναικι ουκ επιτρεπω ουδε αυθεντειν ανδρος αλλ ειναι εν ησυχια
23. Greek
1 Timothy 2:12 But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence. [kjv]
διδασκειν δε γυναικι ουκ επιτρεπω ουδε αυθεντειν ανδρος αλλ ειναι εν ησυχια [gnt]
The ancient Greek word
"αὐθεντικός" ≈ "authentic, authoritative" word appears only here, to Timothy as Bishop of Ephesus, a Greek city which would know the history and meaning of this word.
Discussion question: Is the question of women teaching something Paul intended as a "
vitamin" for this particular city and specific circumstances are is this a "
vitamin" that is to be applied everywhere?
24. 1 Timothy 2:12-14
25. 1 Timothy 2:13
KJV: For Adam was first formed, then Eve.
Greek: αδαμ γαρ πρωτος επλασθη ειτα ευα
26. 1 Timothy 2:14
KJV: And Adam was not deceived, but the woman being deceived was in the transgression.
Greek: και αδαμ ουκ ηπατηθη η δε γυνη απατηθεισα εξαπατηθεισα εν παραβασει γεγονεν
27. Communication review
1 Communication
2 Eavesdrop
3 Man-in-the-middle
4 Spoof
There are various ways that concepts from security authentication can be used to authenticate the Bible as true (in reality and not as a logical system).
|
Details are left as a future topic.
|
28. End of page