SlideShare a Scribd company logo
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 10
Understanding Cryptography & PKI
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January, 2020
Introduction
• Introducing cryptography concepts
• Providing integrity with hashing
• Providing confidentiality with encryption
• Using cryptographic protocols
• Exploring PKI components
Proprietary & Confidential
@GoCyberSec | January, 2020
Cryptography Concepts - Integrity
• Provides assurances that data has not been modified
• Hashing ensures that data has retained integrity
• A hash is a number derived from performing a calculation on data
• If the data is unchanged the hash will always be the same number
• Common hashing algorithms include MD5, SHA, HMAC
• Each algorithm creates a fixed size string of bits
– Example: MD5 creates a hash of 128 bits
Proprietary & Confidential
@GoCyberSec | January, 2020
Cryptography Concepts - Confidentiality
• Ensures only authorized users can view data
• Encryption protects the confidentiality of data
• Encryption ciphers data to make it unreadable
• Encryption normally includes algorithm and key
• Symmetric encryption
– Uses the same key to encrypt and decrypt data
• Asymmetric encryption
– Uses two keys (public and private) created as a matched pair
Proprietary & Confidential
@GoCyberSec | January, 2020
Cryptography Concepts
• Stream ciphers
– 1 bit at a time
• Block ciphers
– Encrypt data in blocks
• Steganography
– Hides data in data
Proprietary & Confidential
@GoCyberSec | January, 2020
Cryptography Concepts
• Authentication validates an identity
• Non-repudiation
– Prevents a party from denying an action
• Digital signatures
– Provide authentication, non-repudiation, and integrity
– Users sign emails with a digital signature
• Digital signature is a hash of an email message encrypted with
the sender’s private key
• Only the sender’s public key can decrypt the data
• Provides verification it was encrypted with the sender’s private
key
Proprietary & Confidential
@GoCyberSec | January, 2020
Providing Integrity with Hashing
• Hashing provides integrity for data
– Email, downloaded files, files stored on a disk
– A one-way function that creates a string of characters
• A hash is a number
– Sometimes called a checksum
– You cannot reverse the hash
– You cannot re-create the original data from the hash
– Created with a hashing algorithm
• Message Digest 5 (MD5)
• Secure Hash Algorithm (SHA) family
• HMAC
Proprietary & Confidential
@GoCyberSec | January, 2020
Hashing Files
Proprietary & Confidential
@GoCyberSec | January, 2020
Hashing Passwords
• Passwords often stored as hashes
• Password attacks attempt to discover passwords
– Guess a password
– Hash the guessed password
– Compare the hash to the original hash
Proprietary & Confidential
@GoCyberSec | January, 2020
Hashing Protocols Review
Algorithm Type Comments
MD5 Hashing - Integrity Creates 128-bit hashes
SHA-1 Hashing - Integrity Creates 160-bit hashes
SHA-2 Hashing - Integrity Creates 224-, 256-, 384-, or 512-bit hashes
SHA-3 Hashing - Integrity Creates 224-, 256-, 384-, or 512-bit hashes
HMAC-MD5 Integrity/Authenticity Creates 128-bit hashes
HMAC-SHA1 Integrity/Authenticity Creates 160-bit hashes
Proprietary & Confidential
@GoCyberSec | January, 2020
Providing Confidentiality with Encryption
• Encryption provides confidentiality
– Helps ensure only authorized users can view data
– Applies to any type of data
• Data-at-rest (files, in a database, and so on)
• Data-in-transit (sent over a network)
– Data-in-use
• Not encrypted while in use
• If sensitive should be purged after use
Proprietary & Confidential
@GoCyberSec | January, 2020
Providing Confidentiality with Encryption
• Two basic components of encryption
– Algorithm
• Performs mathematical calculations on data
• Algorithm always the same
– Key
• A number that provides variability
• Either kept private and/or changed frequently
Proprietary & Confidential
@GoCyberSec | January, 2020
Block vs. Stream Ciphers
• Block ciphers
– Encrypts data in specific sized blocks
• Often 64-bit blocks or 128-bit blocks
– Divides large files or messages into these blocks
– Encrypts each block separately
• Stream ciphers
– Encrypt data as a single bit or byte at a time in a stream
– An important principle when using a stream cipher
• Encryption keys should never be reused
• If a key is reused, it is easier to crack the encryption
Proprietary & Confidential
@GoCyberSec | January, 2020
Block Cipher Modes
• Electronic Codebook (ECB)
– Simplest (deprecated and not recommended)
• Cipher Block Chaining (CBC)
– Susceptible to pipeline delays
• Counter (CTM)
– Converts a block cipher into a stream cipher
• Galois/Counter Mode (GCM)
– Combines CTM with hashing techniques for integrity
Proprietary & Confidential
@GoCyberSec | January, 2020
Symmetric Encryption
• Uses the same key to encrypt and decrypt data
• When transmitting encrypted data
– Uses key to encrypt data before transmission
– Uses same key to decrypt data when received
• Much more efficient encrypting large amounts of data than
asymmetric encryption
• RADIUS uses symmetric encryption
Proprietary & Confidential
@GoCyberSec | January, 2020
Symmetric Encryption
• Obfuscation
– Attempts to make something unclear
– Security through obscurity (isn’t secure)
• Compare symmetric encryption
to a door key
– One key can lock door
– Same key can unlock door
– Copy of same key can lock or unlock door
Proprietary & Confidential
@GoCyberSec | January, 2020
Symmetric Encryption
• Data Encryption Standard (DES)
– 64-bit block cipher
– Uses 56-bit keys and should not be used today
• 3DES
– 64-bit block cipher
– Originally designed as a replacement for DES
– Uses multiple keys and multiple passes
– Not as efficient as AES
– 3DES is still used in some applications, such as
when hardware doesn’t support AES
Proprietary & Confidential
@GoCyberSec | January, 2020
Symmetric Encryption
• RC4
– Symmetric stream cipher
– AES recommended instead of RC4
• Blowfish
– 64-bit block cipher
– Faster than AES in some situations
• Twofish
– 128-bit block cipher
Proprietary & Confidential
@GoCyberSec | January, 2020
Symmetric Encryption
Algorithm Encryption
Type
Method Key Size
AES Symmetric 128-bit block cipher 128-, 192-, or 256-bit key
3DES Symmetric 64-bit block cipher 56-, 112-, or 168-bit key
Blowfish Symmetric 64-bit block cipher 32- to 448-bit key
Twofish Symmetric 128-bit block cipher 128-, 192-, or 256-bit key
RC4* Symmetric Stream cipher 40- to 2,048-bit key
DES* Symmetric 64-bit block cipher 56-bit key
* Don’t use
Proprietary & Confidential
@GoCyberSec | January, 2020
Asymmetric Encryption
• Private Key / Public Key matched pair
– One key encrypts, the other key decrypts
– Only a private key can decrypt information encrypted with a
matching public key
– Only a public key can decrypt information encrypted with a
matching private key
– Private key stays private
– Public key shared in a certificate
– Asymmetric encryption methods require certificate and PKI
Proprietary & Confidential
@GoCyberSec | January, 2020
Asymmetric Encryption
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificates
• Used for
– Encryption
– Authentication
– Digital signatures
• Includes
– Serial number
– Issuer
– Validity dates
– Subject
– Public key
– Usage
Proprietary & Confidential
@GoCyberSec | January, 2020
Using Cryptographic Protocols
• Email digital signatures
– The sender’s private key encrypts (or signs)
– The sender’s public key decrypts
• Email encryption
– The recipient’s public key encrypts
– The recipient’s private key decrypts
Knowing which key
encrypts and which
key decrypts will help
you answer many
questions
Proprietary & Confidential
@GoCyberSec | January, 2020
Using Cryptographic Protocols
• Website encryption
– The website’s public key encrypts, it encrypts a symmetric key
– The website’s private key decrypts, it decrypts a symmetric key
– The symmetric key encrypts data in the website session
Knowing which key
encrypts and which
key decrypts will help
you answer many
questions
Proprietary & Confidential
@GoCyberSec | January, 2020
Using Cryptographic Protocols
• Encrypted hash of a message
– The sender’s private key encrypts the hash
– Recipient decrypts hash with sender’s public key
– Provides
• Authentication – identifies the sender
• Non-repudiation – prevents the sender from denying the
action
• Integrity – verifies the message has not been modified
Proprietary & Confidential
@GoCyberSec | January, 2020
Encrypting Email
• Using only asymmetric encryption (Not common)
– Lisa retrieves a copy of Bart’s certificate that contains his public
key
– Lisa encrypts the email with Bart’s public key
– Lisa sends the encrypted email to Bart
– Bart decrypts the email with his private key
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Email
• S/MIME and PGP/GPG
• Both:
–Use RSA algorithm
–Use public and private keys for encryption and decryption
–Use certificates
–Can digitally sign and encrypt email
–Including email at rest and in transit
–OpenPGP (PGP-based standard)
Proprietary & Confidential
@GoCyberSec | January, 2020
Transport Encryption
• Protects confidentiality of transmitted data
–SSH, IPsec, HTTPS, SSL, and TLS
–IPsec must use HMAC for authentication and integrity
–IPsec can use either AES or 3DES for encryption
–IPsec’s ESP encrypts the entire packet
–Creates an additional IP header
Proprietary & Confidential
@GoCyberSec | January, 2020
TLS and SSL
• TLS is the replacement for SSL
–SSL deprecated
–Both require certificates issued by CAs
• TLS used in HTTPS
–HTTPS uses a combination of symmetric and asymmetric
encryption to encrypt HTTPS sessions
Proprietary & Confidential
@GoCyberSec | January, 2020
Encrypting HTTPS traffic with TLS
Proprietary & Confidential
@GoCyberSec | January, 2020
Cipher Suites
• Three primary cryptographic solutions
–Encryption
–Authentication
–Integrity
• Examples
–0x00C031. TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
–0x00003C. TLS_RSA_WITH_AES_128_CBC_SHA256
Proprietary & Confidential
@GoCyberSec | January, 2020
Downgrade Attacks
• Exploit weak implementations of cipher suites
• Uses weakest cipher suite available
• Padding Oracle On Downgraded Legacy Encryption (POODLE)
attack
–Downgraded to SSL
–Allowed SSL attacks
Proprietary & Confidential
@GoCyberSec | January, 2020
Exploring PKI Components
• Public Key Infrastructure
–Includes components required for certificates
–Allows two entities to privately share symmetric keys without
any prior communication
• Certificate Authority (CA)
–Issues, manages, validates, and revokes certificates
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificate Chaining & Trust Models
• Root certificate
• Trusted root certification authorities
Proprietary & Confidential
@GoCyberSec | January, 2020
Trusted Models
• Certificate chain
–Root CA
–Intermediate Cas
–Child CAs
–All certificates issued by trusted CAs are trusted
–Errors when a site uses an untrusted certificate
• Most trust models are hierarchical and centralized with a central
root CA
• Web-of-trust
–Self-signed certificates
Proprietary & Confidential
@GoCyberSec | January, 2020
Revoking Certificates
• Reasons
–Key or CA Compromise Employee Leaves
–Change of Affiliation Superseded
–Cease of Operation Certificate Hold
• Revoked certificates
–Revoked by serial number
–Published in Certificate Revocation List (CRL)
–Publicly available
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificate Revocation List (CRL)
• Issued in a version 2 certificate
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificate Revocation List (CRL)
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificate Revocation List (CRL)
Proprietary & Confidential
@GoCyberSec | January, 2020
Certificate Types
• Machine/computer
• User
• Email
–Encryption and digital signatures
• Code signing
–Validates authentication of code
• Self-signed
–Not issued by CA
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 10 Summary
• Introducing cryptography concepts
• Providing integrity with hashing
• Providing confidentiality with encryption
• Using cryptographic protocols
• Exploring PKI components

More Related Content

PPTX
501 ch 6 threats vulnerabilities and common attacks
PPTX
501 ch 8 risk managment tool
PPTX
501 ch 2 understanding iam
PPTX
501 ch 4 securing your network
PPTX
501 ch 7 protecting against advanced attacks
PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 1 mastering security basics
PPTX
501 ch 3 network technologies tools
501 ch 6 threats vulnerabilities and common attacks
501 ch 8 risk managment tool
501 ch 2 understanding iam
501 ch 4 securing your network
501 ch 7 protecting against advanced attacks
501 ch 5 securing hosts and data
501 ch 1 mastering security basics
501 ch 3 network technologies tools

What's hot (18)

PPTX
501 ch 3 network technologies and tools
PDF
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
PPTX
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
PPT
grid authentication
PDF
Data Security for Project Managers
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PPTX
Houston techfest spring 2018
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
PPT
From The Hidden Internet: Lesson From 12 Months Of Monitoring
PPTX
How to write secure code
PDF
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
PPTX
Cryptzone AppGate Technical Architecture
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
Denver AWS Users' Group Meetup - May 2020
PDF
AWS November meetup Slides
PPTX
Modern Honey Network at Bay Area Open Source Security Hackers
PDF
Dr. David Movshovitz - Navajo SaaS
PPTX
Plain talk about security public - ms1
501 ch 3 network technologies and tools
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
grid authentication
Data Security for Project Managers
Cryptzone: What is a Software-Defined Perimeter?
Houston techfest spring 2018
Essential Guide to Protect Your Data [Key Management Techniques]
From The Hidden Internet: Lesson From 12 Months Of Monitoring
How to write secure code
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
Cryptzone AppGate Technical Architecture
How to Overcome Network Access Control Limitations for Better Network Security
Denver AWS Users' Group Meetup - May 2020
AWS November meetup Slides
Modern Honey Network at Bay Area Open Source Security Hackers
Dr. David Movshovitz - Navajo SaaS
Plain talk about security public - ms1
Ad

Similar to 501 ch 10 understanding cryptography and pki (20)

PPTX
501 ch 10 cryptography
PPT
Network Security: Standards and Cryptography
PDF
Basic Cryptography.pdf
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
PPT
BCS_PKI_part1.ppt
PPTX
big data and Iot , its security part ,hoe yoy help this
PDF
Applied Cryptography
PDF
computer-security-and-cryptography-a-simple-presentation
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Cryptography
PPT
Cryptography
PPTX
Cryptography and PKI
PPTX
Security
PPT
Java Crypto
PPT
Cryptography Lecture by Sam Bowne
PPTX
Encryption in Cryptography
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PPT
Is case study
501 ch 10 cryptography
Network Security: Standards and Cryptography
Basic Cryptography.pdf
CISSP EXAM PREPARATION FOR A PASSED SCORE
BCS_PKI_part1.ppt
big data and Iot , its security part ,hoe yoy help this
Applied Cryptography
computer-security-and-cryptography-a-simple-presentation
Fundamentals of Cryptography: Securing Data in the Digital Age
Cryptography
Cryptography
Cryptography and PKI
Security
Java Crypto
Cryptography Lecture by Sam Bowne
Encryption in Cryptography
Ch12 Cryptography it-slideshares.blogspot.com
Is case study
Ad

More from gocybersec (12)

PPTX
501 ch 9 implementing controls to protect assets
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 11 operational security
PPTX
501 ch 9 implementing controls
PPTX
501 ch 8 risk management tools
PPTX
501 ch 6 threats vulnerabilities attacks
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 4 securing your network
PPTX
501 ch 3 network technologies tools
PPTX
501 ch 2 understanding iam
PPTX
501 ch-1-mastering-security-basics
501 ch 9 implementing controls to protect assets
501 ch 7 advanced attacks
501 ch 11 operational security
501 ch 9 implementing controls
501 ch 8 risk management tools
501 ch 6 threats vulnerabilities attacks
501 ch 7 advanced attacks
501 ch 5 securing hosts and data
501 ch 4 securing your network
501 ch 3 network technologies tools
501 ch 2 understanding iam
501 ch-1-mastering-security-basics

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
Hybrid model detection and classification of lung cancer
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
The various Industrial Revolutions .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
Hybrid model detection and classification of lung cancer
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
observCloud-Native Containerability and monitoring.pptx
Web App vs Mobile App What Should You Build First.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
TLE Review Electricity (Electricity).pptx
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Architecture types and enterprise applications.pdf
A novel scalable deep ensemble learning framework for big data classification...
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Getting Started with Data Integration: FME Form 101
OMC Textile Division Presentation 2021.pptx

501 ch 10 understanding cryptography and pki

  • 1. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 10 Understanding Cryptography & PKI CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January, 2020 Introduction • Introducing cryptography concepts • Providing integrity with hashing • Providing confidentiality with encryption • Using cryptographic protocols • Exploring PKI components
  • 3. Proprietary & Confidential @GoCyberSec | January, 2020 Cryptography Concepts - Integrity • Provides assurances that data has not been modified • Hashing ensures that data has retained integrity • A hash is a number derived from performing a calculation on data • If the data is unchanged the hash will always be the same number • Common hashing algorithms include MD5, SHA, HMAC • Each algorithm creates a fixed size string of bits – Example: MD5 creates a hash of 128 bits
  • 4. Proprietary & Confidential @GoCyberSec | January, 2020 Cryptography Concepts - Confidentiality • Ensures only authorized users can view data • Encryption protects the confidentiality of data • Encryption ciphers data to make it unreadable • Encryption normally includes algorithm and key • Symmetric encryption – Uses the same key to encrypt and decrypt data • Asymmetric encryption – Uses two keys (public and private) created as a matched pair
  • 5. Proprietary & Confidential @GoCyberSec | January, 2020 Cryptography Concepts • Stream ciphers – 1 bit at a time • Block ciphers – Encrypt data in blocks • Steganography – Hides data in data
  • 6. Proprietary & Confidential @GoCyberSec | January, 2020 Cryptography Concepts • Authentication validates an identity • Non-repudiation – Prevents a party from denying an action • Digital signatures – Provide authentication, non-repudiation, and integrity – Users sign emails with a digital signature • Digital signature is a hash of an email message encrypted with the sender’s private key • Only the sender’s public key can decrypt the data • Provides verification it was encrypted with the sender’s private key
  • 7. Proprietary & Confidential @GoCyberSec | January, 2020 Providing Integrity with Hashing • Hashing provides integrity for data – Email, downloaded files, files stored on a disk – A one-way function that creates a string of characters • A hash is a number – Sometimes called a checksum – You cannot reverse the hash – You cannot re-create the original data from the hash – Created with a hashing algorithm • Message Digest 5 (MD5) • Secure Hash Algorithm (SHA) family • HMAC
  • 8. Proprietary & Confidential @GoCyberSec | January, 2020 Hashing Files
  • 9. Proprietary & Confidential @GoCyberSec | January, 2020 Hashing Passwords • Passwords often stored as hashes • Password attacks attempt to discover passwords – Guess a password – Hash the guessed password – Compare the hash to the original hash
  • 10. Proprietary & Confidential @GoCyberSec | January, 2020 Hashing Protocols Review Algorithm Type Comments MD5 Hashing - Integrity Creates 128-bit hashes SHA-1 Hashing - Integrity Creates 160-bit hashes SHA-2 Hashing - Integrity Creates 224-, 256-, 384-, or 512-bit hashes SHA-3 Hashing - Integrity Creates 224-, 256-, 384-, or 512-bit hashes HMAC-MD5 Integrity/Authenticity Creates 128-bit hashes HMAC-SHA1 Integrity/Authenticity Creates 160-bit hashes
  • 11. Proprietary & Confidential @GoCyberSec | January, 2020 Providing Confidentiality with Encryption • Encryption provides confidentiality – Helps ensure only authorized users can view data – Applies to any type of data • Data-at-rest (files, in a database, and so on) • Data-in-transit (sent over a network) – Data-in-use • Not encrypted while in use • If sensitive should be purged after use
  • 12. Proprietary & Confidential @GoCyberSec | January, 2020 Providing Confidentiality with Encryption • Two basic components of encryption – Algorithm • Performs mathematical calculations on data • Algorithm always the same – Key • A number that provides variability • Either kept private and/or changed frequently
  • 13. Proprietary & Confidential @GoCyberSec | January, 2020 Block vs. Stream Ciphers • Block ciphers – Encrypts data in specific sized blocks • Often 64-bit blocks or 128-bit blocks – Divides large files or messages into these blocks – Encrypts each block separately • Stream ciphers – Encrypt data as a single bit or byte at a time in a stream – An important principle when using a stream cipher • Encryption keys should never be reused • If a key is reused, it is easier to crack the encryption
  • 14. Proprietary & Confidential @GoCyberSec | January, 2020 Block Cipher Modes • Electronic Codebook (ECB) – Simplest (deprecated and not recommended) • Cipher Block Chaining (CBC) – Susceptible to pipeline delays • Counter (CTM) – Converts a block cipher into a stream cipher • Galois/Counter Mode (GCM) – Combines CTM with hashing techniques for integrity
  • 15. Proprietary & Confidential @GoCyberSec | January, 2020 Symmetric Encryption • Uses the same key to encrypt and decrypt data • When transmitting encrypted data – Uses key to encrypt data before transmission – Uses same key to decrypt data when received • Much more efficient encrypting large amounts of data than asymmetric encryption • RADIUS uses symmetric encryption
  • 16. Proprietary & Confidential @GoCyberSec | January, 2020 Symmetric Encryption • Obfuscation – Attempts to make something unclear – Security through obscurity (isn’t secure) • Compare symmetric encryption to a door key – One key can lock door – Same key can unlock door – Copy of same key can lock or unlock door
  • 17. Proprietary & Confidential @GoCyberSec | January, 2020 Symmetric Encryption • Data Encryption Standard (DES) – 64-bit block cipher – Uses 56-bit keys and should not be used today • 3DES – 64-bit block cipher – Originally designed as a replacement for DES – Uses multiple keys and multiple passes – Not as efficient as AES – 3DES is still used in some applications, such as when hardware doesn’t support AES
  • 18. Proprietary & Confidential @GoCyberSec | January, 2020 Symmetric Encryption • RC4 – Symmetric stream cipher – AES recommended instead of RC4 • Blowfish – 64-bit block cipher – Faster than AES in some situations • Twofish – 128-bit block cipher
  • 19. Proprietary & Confidential @GoCyberSec | January, 2020 Symmetric Encryption Algorithm Encryption Type Method Key Size AES Symmetric 128-bit block cipher 128-, 192-, or 256-bit key 3DES Symmetric 64-bit block cipher 56-, 112-, or 168-bit key Blowfish Symmetric 64-bit block cipher 32- to 448-bit key Twofish Symmetric 128-bit block cipher 128-, 192-, or 256-bit key RC4* Symmetric Stream cipher 40- to 2,048-bit key DES* Symmetric 64-bit block cipher 56-bit key * Don’t use
  • 20. Proprietary & Confidential @GoCyberSec | January, 2020 Asymmetric Encryption • Private Key / Public Key matched pair – One key encrypts, the other key decrypts – Only a private key can decrypt information encrypted with a matching public key – Only a public key can decrypt information encrypted with a matching private key – Private key stays private – Public key shared in a certificate – Asymmetric encryption methods require certificate and PKI
  • 21. Proprietary & Confidential @GoCyberSec | January, 2020 Asymmetric Encryption
  • 22. Proprietary & Confidential @GoCyberSec | January, 2020 Certificates • Used for – Encryption – Authentication – Digital signatures • Includes – Serial number – Issuer – Validity dates – Subject – Public key – Usage
  • 23. Proprietary & Confidential @GoCyberSec | January, 2020 Using Cryptographic Protocols • Email digital signatures – The sender’s private key encrypts (or signs) – The sender’s public key decrypts • Email encryption – The recipient’s public key encrypts – The recipient’s private key decrypts Knowing which key encrypts and which key decrypts will help you answer many questions
  • 24. Proprietary & Confidential @GoCyberSec | January, 2020 Using Cryptographic Protocols • Website encryption – The website’s public key encrypts, it encrypts a symmetric key – The website’s private key decrypts, it decrypts a symmetric key – The symmetric key encrypts data in the website session Knowing which key encrypts and which key decrypts will help you answer many questions
  • 25. Proprietary & Confidential @GoCyberSec | January, 2020 Using Cryptographic Protocols • Encrypted hash of a message – The sender’s private key encrypts the hash – Recipient decrypts hash with sender’s public key – Provides • Authentication – identifies the sender • Non-repudiation – prevents the sender from denying the action • Integrity – verifies the message has not been modified
  • 26. Proprietary & Confidential @GoCyberSec | January, 2020 Encrypting Email • Using only asymmetric encryption (Not common) – Lisa retrieves a copy of Bart’s certificate that contains his public key – Lisa encrypts the email with Bart’s public key – Lisa sends the encrypted email to Bart – Bart decrypts the email with his private key
  • 27. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Email • S/MIME and PGP/GPG • Both: –Use RSA algorithm –Use public and private keys for encryption and decryption –Use certificates –Can digitally sign and encrypt email –Including email at rest and in transit –OpenPGP (PGP-based standard)
  • 28. Proprietary & Confidential @GoCyberSec | January, 2020 Transport Encryption • Protects confidentiality of transmitted data –SSH, IPsec, HTTPS, SSL, and TLS –IPsec must use HMAC for authentication and integrity –IPsec can use either AES or 3DES for encryption –IPsec’s ESP encrypts the entire packet –Creates an additional IP header
  • 29. Proprietary & Confidential @GoCyberSec | January, 2020 TLS and SSL • TLS is the replacement for SSL –SSL deprecated –Both require certificates issued by CAs • TLS used in HTTPS –HTTPS uses a combination of symmetric and asymmetric encryption to encrypt HTTPS sessions
  • 30. Proprietary & Confidential @GoCyberSec | January, 2020 Encrypting HTTPS traffic with TLS
  • 31. Proprietary & Confidential @GoCyberSec | January, 2020 Cipher Suites • Three primary cryptographic solutions –Encryption –Authentication –Integrity • Examples –0x00C031. TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 –0x00003C. TLS_RSA_WITH_AES_128_CBC_SHA256
  • 32. Proprietary & Confidential @GoCyberSec | January, 2020 Downgrade Attacks • Exploit weak implementations of cipher suites • Uses weakest cipher suite available • Padding Oracle On Downgraded Legacy Encryption (POODLE) attack –Downgraded to SSL –Allowed SSL attacks
  • 33. Proprietary & Confidential @GoCyberSec | January, 2020 Exploring PKI Components • Public Key Infrastructure –Includes components required for certificates –Allows two entities to privately share symmetric keys without any prior communication • Certificate Authority (CA) –Issues, manages, validates, and revokes certificates
  • 34. Proprietary & Confidential @GoCyberSec | January, 2020 Certificate Chaining & Trust Models • Root certificate • Trusted root certification authorities
  • 35. Proprietary & Confidential @GoCyberSec | January, 2020 Trusted Models • Certificate chain –Root CA –Intermediate Cas –Child CAs –All certificates issued by trusted CAs are trusted –Errors when a site uses an untrusted certificate • Most trust models are hierarchical and centralized with a central root CA • Web-of-trust –Self-signed certificates
  • 36. Proprietary & Confidential @GoCyberSec | January, 2020 Revoking Certificates • Reasons –Key or CA Compromise Employee Leaves –Change of Affiliation Superseded –Cease of Operation Certificate Hold • Revoked certificates –Revoked by serial number –Published in Certificate Revocation List (CRL) –Publicly available
  • 37. Proprietary & Confidential @GoCyberSec | January, 2020 Certificate Revocation List (CRL) • Issued in a version 2 certificate
  • 38. Proprietary & Confidential @GoCyberSec | January, 2020 Certificate Revocation List (CRL)
  • 39. Proprietary & Confidential @GoCyberSec | January, 2020 Certificate Revocation List (CRL)
  • 40. Proprietary & Confidential @GoCyberSec | January, 2020 Certificate Types • Machine/computer • User • Email –Encryption and digital signatures • Code signing –Validates authentication of code • Self-signed –Not issued by CA
  • 41. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 10 Summary • Introducing cryptography concepts • Providing integrity with hashing • Providing confidentiality with encryption • Using cryptographic protocols • Exploring PKI components

Editor's Notes

  • #28: SLE = $2,000 ARO = 12 ALE = $24,000
  • #29: SLE = $2,000 ARO = 12 ALE = $24,000
  • #30: SLE = $2,000 ARO = 12 ALE = $24,000
  • #31: EMI – Electromagnetic interference RFI – Radio Frequency Interference Interferes with normal signal transmission