SlideShare a Scribd company logo
Cryptographic
methods I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
ď‚§ PC Hardware
ď‚§ Network Administration
ď‚§ IT Project Management
ď‚§ Network Design
ď‚§ User Training
ď‚§ IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Cipher suites.
– Cryptographic implementations.
PACE-IT.
Page 4
Cryptographic methods I.
Page 5
In most cases, a single
cryptographic method will
not provide the required
level of security that most
organizations seek.
The solution is to use a cipher suite to provide the necessary
security. A cipher suite is when a group of cryptographic solutions
are combined to provide user authentication, encryption, and
message authentication solutions into a single set.
One measure of the strength of the cipher suite is the number of
bits that make up the keys. The longer (more bits) the key set, the
stronger the cipher—which will lead to a stronger cipher suites.
One thing to remember: the stronger the cipher suite, the more
computing power and time it will take when in use.
Cryptographic methods I.
Page 6
Cryptographic methods I.
Page 7
– PAP (password authentication protocol).
» An authentication protocol that does not use any cryptographic
methods to ensure the integrity of the message.
• The username and password are sent in clear text; this is not
a secure solution.
– CHAP (Challenge-Handshake
Authentication Protocol).
» A cryptographic authentication protocol used to authenticate
remote clients based on hashed values.
• The client combines its password with a key supplied by the
server to generate a hashed value (MD5 is the algorithm used
to generate that message digest).
• The client sends the hashed value (message digest) back to
the server, which then compares what was received against a
stored value.
• If the values match, the client is authenticated and then given
access to authorized resources.
» CHAP is considered to be a type of HMAC (Hash-based
Message Authentication Code).
Cryptographic methods I.
Page 8
– RIPEMD (RACE Integrity Primitives
Evaluation Message Digest).
» A cryptographic hashing algorithm developed as an open
source solution.
» When implemented, the most common version is RIPEMD-160
(uses a 160-bit hashing function).
• There are also 128, 256, and 320-bit versions.
– NTLMv2 (NT LAN Manager version 2).
» A cryptographic hashing process used in Windows operating
systems for storing passwords in the registry as hashed values.
• Uses HMAC-MD5 (HMAC using Message Digest 5) as the
method of creating and storing the message digest.
» Replaced NTLM, which used MD4 as the hashing algorithm for
the HMAC.
Cryptographic methods I.
Page 9
– MD (Message Digest).
» A cryptographic hashing algorithm developed by Ron Rivest as a
method of using hashed values for authentication purposes,
particularly to ensure that the data that is received is the data that
was sent.
» MD5 is the most popular version and always generates a 128-bit
hashed value.
• While still in use, MD5 has been proven to be a broken
cryptographic solution and should not be used for mission critical
security needs.
– SHA (Secure Hash Algorithm).
» A cryptographic hashing algorithm developed by the NSA (National
Security Agency) as a method of using hashed values for
authenticating data—to ensure the data’s integrity.
» SHA-1 is the most popular version and always generates a 160-bit
hashed value.
• In theory, SHA-1 has been broken (the theoretical weaknesses
have yet to be proven) and most U.S. government agencies now
require the use of SHA-2—an improved version of the original
SHA family of hashing algorithms.
Cryptographic methods I.
Page 10
Cryptographic methods I.
In most cases, a single cryptographic implementation will not provide
adequate security. The solution is to use a cipher suite, which is a
combination of different cryptographic products to provide data integrity
services, user authentication, and encryption. The strength of the cipher
suite is dependent on the bit strength of the security keys that are used.
Topic
Cipher suites.
Summary
PAP doesn’t employ any cryptographic methods and should not be used.
Some common implementations of cryptography that rely upon hashing to
provide integrity checks include: CHAP, RIPEMD, NTLMv2, MD, and SHA.
Cryptographic
implementations.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)

What's hot (19)

PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
Hunting the Evil of your Infrastructure
PPT
Security and information assurance
PPTX
PACE-IT: Network Hardening Techniques (part 3)
PDF
Ctia course outline
PDF
C02
PDF
Chapter 3 security principals
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
Red Team vs. Blue Team
PDF
Banking and Modern Payments System Security Analysis
PDF
Fundamentals of-information-security
PPTX
CyberSecurity Portfolio Management
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Hunting the Evil of your Infrastructure
Security and information assurance
PACE-IT: Network Hardening Techniques (part 3)
Ctia course outline
C02
Chapter 3 security principals
PACE-IT: Network Hardening Techniques (part 2)
Red Team vs. Blue Team
Banking and Modern Payments System Security Analysis
Fundamentals of-information-security
CyberSecurity Portfolio Management
Ad

Viewers also liked (11)

PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Cloud Computing
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.1: Types of Malware
Cloud Computing
PACE-IT, Security+2.9: Goals of Security Controls
Ad

Similar to PACE-IT, Security+ 6.2: Cryptographic Methods (part 1) (20)

PDF
Applied cryptanalysis - everything else
PPTX
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
PDF
Encryption Recap: A Refresher on Key Concepts
PDF
IRJET - Hash Functions and its Security for Snags
PDF
Ch04-Computer Security
PPTX
Information and data security cryptographic hash functions
PPTX
501 ch 10 cryptography
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
PPTX
IS413 Topic 5.pptx
ODP
CISSP Week 20
PDF
Hash
PPTX
Efficient authentication for mobile and pervasive computing
PPTX
All details of cryptography and all the topics of cryptography was explained
PDF
BAIT1103 Chapter 2
 
PDF
AllBits presentation - Security in Theory
PPTX
Cryptography and network_security
PPT
NSC_Unit-III_final.ppt
PPTX
Crypto academy
PPTX
Technology, Process, and Strategy
PPTX
Network Security Unit-2 topic Part-2.pptx
Applied cryptanalysis - everything else
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
Encryption Recap: A Refresher on Key Concepts
IRJET - Hash Functions and its Security for Snags
Ch04-Computer Security
Information and data security cryptographic hash functions
501 ch 10 cryptography
Computer System Security (UNIT IV) For AKTU Lucknow
IS413 Topic 5.pptx
CISSP Week 20
Hash
Efficient authentication for mobile and pervasive computing
All details of cryptography and all the topics of cryptography was explained
BAIT1103 Chapter 2
 
AllBits presentation - Security in Theory
Cryptography and network_security
NSC_Unit-III_final.ppt
Crypto academy
Technology, Process, and Strategy
Network Security Unit-2 topic Part-2.pptx

Recently uploaded (20)

PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
 
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Business Ethics Teaching Materials for college
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
 
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
Classroom Observation Tools for Teachers
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Business Ethics Teaching Materials for college
Microbial diseases, their pathogenesis and prophylaxis
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pre independence Education in Inndia.pdf
Anesthesia in Laparoscopic Surgery in India
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx

PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications ď‚§ PC Hardware ď‚§ Network Administration ď‚§ IT Project Management ď‚§ Network Design ď‚§ User Training ď‚§ IT Troubleshooting Qualifications Summary Education ď‚§ M.B.A., IT Management, Western Governor’s University ď‚§ B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Cipher suites. – Cryptographic implementations. PACE-IT.
  • 5. Page 5 In most cases, a single cryptographic method will not provide the required level of security that most organizations seek. The solution is to use a cipher suite to provide the necessary security. A cipher suite is when a group of cryptographic solutions are combined to provide user authentication, encryption, and message authentication solutions into a single set. One measure of the strength of the cipher suite is the number of bits that make up the keys. The longer (more bits) the key set, the stronger the cipher—which will lead to a stronger cipher suites. One thing to remember: the stronger the cipher suite, the more computing power and time it will take when in use. Cryptographic methods I.
  • 7. Page 7 – PAP (password authentication protocol). » An authentication protocol that does not use any cryptographic methods to ensure the integrity of the message. • The username and password are sent in clear text; this is not a secure solution. – CHAP (Challenge-Handshake Authentication Protocol). » A cryptographic authentication protocol used to authenticate remote clients based on hashed values. • The client combines its password with a key supplied by the server to generate a hashed value (MD5 is the algorithm used to generate that message digest). • The client sends the hashed value (message digest) back to the server, which then compares what was received against a stored value. • If the values match, the client is authenticated and then given access to authorized resources. » CHAP is considered to be a type of HMAC (Hash-based Message Authentication Code). Cryptographic methods I.
  • 8. Page 8 – RIPEMD (RACE Integrity Primitives Evaluation Message Digest). » A cryptographic hashing algorithm developed as an open source solution. » When implemented, the most common version is RIPEMD-160 (uses a 160-bit hashing function). • There are also 128, 256, and 320-bit versions. – NTLMv2 (NT LAN Manager version 2). » A cryptographic hashing process used in Windows operating systems for storing passwords in the registry as hashed values. • Uses HMAC-MD5 (HMAC using Message Digest 5) as the method of creating and storing the message digest. » Replaced NTLM, which used MD4 as the hashing algorithm for the HMAC. Cryptographic methods I.
  • 9. Page 9 – MD (Message Digest). » A cryptographic hashing algorithm developed by Ron Rivest as a method of using hashed values for authentication purposes, particularly to ensure that the data that is received is the data that was sent. » MD5 is the most popular version and always generates a 128-bit hashed value. • While still in use, MD5 has been proven to be a broken cryptographic solution and should not be used for mission critical security needs. – SHA (Secure Hash Algorithm). » A cryptographic hashing algorithm developed by the NSA (National Security Agency) as a method of using hashed values for authenticating data—to ensure the data’s integrity. » SHA-1 is the most popular version and always generates a 160-bit hashed value. • In theory, SHA-1 has been broken (the theoretical weaknesses have yet to be proven) and most U.S. government agencies now require the use of SHA-2—an improved version of the original SHA family of hashing algorithms. Cryptographic methods I.
  • 10. Page 10 Cryptographic methods I. In most cases, a single cryptographic implementation will not provide adequate security. The solution is to use a cipher suite, which is a combination of different cryptographic products to provide data integrity services, user authentication, and encryption. The strength of the cipher suite is dependent on the bit strength of the security keys that are used. Topic Cipher suites. Summary PAP doesn’t employ any cryptographic methods and should not be used. Some common implementations of cryptography that rely upon hashing to provide integrity checks include: CHAP, RIPEMD, NTLMv2, MD, and SHA. Cryptographic implementations.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.