Sy0-701 - Lesson 03
Sy0-701 - Lesson 03
Lesson 3
Explaining Appropriate Cryptographic
Solutions
2
Lesson 3
Topic 3A
Cryptographic Algorithms
• Asymmetric
4
Symmetric Encryption
• Encryption uses a reversible process
(algorithm) based on a key that is only
known by authorized persons
• Substitution and transposition
• Process should be too complex to unravel
without the key
• Symmetric algorithms
• Same secret key is used for encryption
and decryption
6
Asymmetric Encryption
• Public/private key pair
• If the public key encrypts, only the private key can
decrypt
7
Hashing
• Fixed length digest from variable string
with cryptographic properties
• One-way (plaintext cannot be recovered from
the digest)
• 128-bit only
8
Digital Signatures
• Using public key cryptography with hashing
• Digital signatures provide integrity, authentication, non-repudiation
9
Review Activity: Cryptographic Algorithms
• Cryptographic concepts
• Symmetric encryption
• Same secret key encrypts and decrypts
• Key length
• Asymmetric encryption
• Public/private key pair
• Hashing
• Non-reversible
• Digital signatures
• Sign message hash with private key and validate with public key
10
Lab Activity
• Applied Lab: Using Storage Encryption
11
Lesson 3
Topic 3B
Public Key Infrastructure
• Third-party CA
• Entity that has established
widespread trust in its policies and
procedures for issuing certificates
13
Digital Certificates
• Contains subject’s public key
• Information identifying the
subject plus usage and validity
• Digital certificate standards
• X.509 Public Key
Infrastructure (PKIX)
• PKCS (Public Key
Cryptography Standards)
14
Root of Trust
• Root certificate
• Self-signed, so users must trust in the CA’s security
procedures
• Single CA
• CA issues certificates directly to subjects
• Hierarchical/chain of trust
• Root CA
• Intermediate CAs
• Leaf certificates
• Self-signed certificates
• Use certificate security without PKI, but provide no
root of trust
16
Subject Name Attributes
• Common Name (CN)
• Legacy method of recording fully
qualified domain name (FQDN)
• Deprecated by standards
18
Key Management
• Key lifecycle
• Key generation
• Storage
• Revocation
• Expiration and renewal
• Tamper-evident storage
• Secure enclave
• Protect keys loaded in system memory
20
Key Escrow
• Keys can be backed up to protect against data loss
• Anyone with access to backup keys could impersonate the true key
holder
• Escrow backup
• Placing archived keys with a trusted third party
• M-of-N control
• Key recovery processes can be protected by M of N control
• Split key into multiple parts held by different key recovery agents
21
Review Activity: Public Key Infrastructure
• Certificate authorities
• Digital certificates
• Root of trust
• Certificate signing requests
• Subject name attributes
• Certificate revocation
• Key management
• Cryptoprocessors and secure enclaves
• Key escrow
22
Lesson 3
Topic 3C
Cryptographic Solutions
• Bulk encryption
• Using a private asymmetric key is inefficient for large amounts of data
• Private key (key encryption key) is used to encrypt a symmetric key
(media/data encryption key)
24
Disk and File Encryption
• Data at rest storage levels
• Full disk and partition encryption
• Encrypt whole disk or partition on disk
• Often performed by drive firmware (self-encrypting)
25
Database Encryption
• Structured data
• Tables, columns (fields), and rows (records)
• Database Management System (DBMS)
• Structured Query Language (SQL)
• Database-level encryption
• Page-level decryption and encryption as data is moved from disk to memory
• Record-level encryption
• Cell/column versus record-level
• Enforce fine-grained access controls to support compliance requirements for
privacy/security
26
Transport Encryption and Key Exchange
27
Perfect Forward Secrecy
28
Salting and Key Stretching
• Password hashes
• User-generated data is low entropy
• Brute force attack discovers value by generating every possible value and finding a match
• Salting
• Add a random value to each password when hashing it for storage
• Prevents use of pre-computed hash tables
• Key stretching
• Use additional rounds to strengthen keys
• Makes attacker do more work, so slows down brute force
29
Blockchain
• Expanding list of transactional records (blocks)
• Each block is linked by hashing
• Open public ledger
• Ledger of transactions performed on a digital asset
• Peer-to-peer so transactions are public
• Transactions cannot be deleted or reversed
• Widely used for cryptocurrencies
• Potential uses for financial transactions, online voting systems,
identity management systems, notarization, data storage, …
30
Obfuscation
• Steganography
• Concealing messages within a covertext
• Often uses file data that can be manipulated without introducing obvious artifacts
• Covert channels
• Data masking
• Redacting information from fields
• Tokenization
• Substituting data with token
• Reversible with access to the token server
• De-identification
31
Review Activity: Cryptographic Solutions
• Encryption supporting confidentiality
• Disk and file encryption
• Database encryption
• Transport encryption and key exchange
• Perfect forward secrecy
• Salting and key stretching
• Blockchain
• Obfuscation
32
Lab Activity
• Assisted Lab: Using Hashing and Salting
33
CompTIA Security+ Exam SY0-701
Lesson 3
Summary