This document provides an overview of the domain of cryptography including hashing algorithms, symmetric and asymmetric encryption, digital signatures, public key infrastructure (PKI), and common cryptographic concepts, operations, and applications. It outlines the SHA family of hashing algorithms, symmetric encryption algorithms like AES and common key sizes, asymmetric or public key cryptography including the use of digital certificates, and hybrid cryptosystems that combine both symmetric and asymmetric techniques. The document was created by Henry Jiang, CISO and CISSP at Oppenheimer & Co., Inc. to map out the key components and concepts within cryptography.
This document provides an overview of the domain of cryptography including hashing algorithms, symmetric and asymmetric encryption, digital signatures, public key infrastructure (PKI), and common cryptographic concepts, operations, and applications. It outlines the SHA family of hashing algorithms, symmetric encryption algorithms like AES and common key sizes, asymmetric or public key cryptography including the use of digital certificates, and hybrid cryptosystems that combine both symmetric and asymmetric techniques. The document was created by Henry Jiang, CISO and CISSP at Oppenheimer & Co., Inc. to map out the key components and concepts within cryptography.
The Domain of Cryptography SHA-1 Procedures Communication Protocols 160bit hash Version 1.0 (no longer considered secure) Applications Map created by: Henry Jiang, CISO | CISSP MD4 128bit hash SHA-2 Family Public Key Cryptography Components (aka Asymmetric algorithms) Oppenheimer & Co., Inc. Authorization Authentication MD5 128bit hash Hashing Algorithms (oneway encryption) Public Key Infrastructure (PKI) (X.509 standard) Certificate Authority (CA) Confidentiality Integrity Hybrid - Both Asymmetric and Symmetric Provides service for: Weaknesses confidentiality, authentication Nonrepudiation Digital Certificate - Key management (need to secure the key etc.) Message Integrity integrity, and nonrepudiation (used to confirm a key is genuine) - Provide confidentiality only, not authentication nor nonrepudiation Crypto services Crypto Operation Concepts Cryptosystem E(m,k)=C The Domain of Cryptography Cipher Block M=D(c,k) Plaintext Ciphertext Encryption Decryption Plaintext Electronic Code Chaining (CBC) PKI IPSec Book (ECB) -------------- E(Encryption) (if use PKI) M(Message) Key Management Private Keys SSL / TLS Strengths C(Ciphertext) - client uses server's public key to encrypt a random number SSH - Faster K(Key) - server uses its private key to decrypt the random number Modes of Operation - difficult to break with large keysize D(Decryption) - symmetric session key derived from the random number (common) Hybrid Systems - use hash function to perform integrity check
Stream Ciphers HMAC (Hashed Message
Authentication Code) Block Ciphers Symmetric Encryption Asymmetric Encryption Digital Signature (Asymmetric + HASH) Symmetric + HASH (common key sizes: 112, 128, 192, 256) ("Intractable Problems") (A digital signature is a hash value i.e. HMAC+MD5 Data Encryption that has been encrypted with sender's private key) Common Algorithms Standard (DES) i.e. RSA + SHA256 Common use cases 56bit key size Year 1975 RC4/RC5/RC6 No longer considered secure Common use cases Private Key exchanges: SSH, IPSec, SSL/TLS Triple-DES (3DES) Advanced Encryption Encrypt messages with (3) Standard (AES) PKI Strengths Common Algorithms iterations of DES key sizes: 128, 192, 256 bits - Better key distribution mechanism El Gamal 56, 112, 168 bit key sizes NIST initiated, become official standard - More scalable Year 1998 for FIPS in Dec. 2001 - Provides authentication and nonrepudiation Session Encryption Diffie-Hellman Key Exchange
Disk or file encryption
- FireValut (Mac) IPSec Elliptic curve crypto system - BitLocker (Windows) (if use pre-shared key) (ECC) - TrueCrypt (File and folder) key sizes: 224-255, 256-383, 384-511, 512+ - Supported by all major storage solutions: Low on CPU consumption EMC, NetApp, etc. Mobile devices: Apple iOS, Android, Blackberry, etc. Rivest-Shamir-Adleman (RSA) Key sizes: 2048, 3072, 7680, 15360 factorization of prime numbers (CPU intensive)
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings - Quick Download In Full PDF Format With All Chapters