Comptia Security-Module 3
Comptia Security-Module 3
Decryption, which transforms ciphertext back into plain text using a decryption key
Cryptography goals
Transposition cipher
Steganography
The technic used to encrypt the plain-text message is called is called the
cryptographic algorithm
Ciphers are the algorithms used to perform encryption and decryption operations
There are three types of algorithms commonly used today: symmetric key
encryption algorithms, asymmetric key encryption algorithms, and hashing
algorithms
3.3 Symmetric Cryptography
Symmetric Key Algorithms
This key is used by all parties to both encrypt and decrypt messages
There are two types of symmetric encryption algorithms: Block and Stream
algorithms.
• Examples of symmetric encryption algorithms :
• AES (Advanced Encryption Standard) : recommended by security standards : 128, 192, and 256 bits
• DES (Data Encryption Standard)
• IDEA (International Data Encryption Algorithm)
• Blowfish (Drop-in replacement for DES or IDEA)
• RC4 (Rivest Cipher 4) : 56-bit
• RC5 (Rivest Cipher 5)
• RC6 (Rivest Cipher 6)
• AES, DES, IDEA, Blowfish, RC5 and RC6 are block ciphers. RC4 is stream cipher.
3.5 Asymmetric Cryptography
Asymmetric Cryptography
and a private key, which is kept secret and known only to the owner of the keypair
Hash functions take a potentially long message and generate a unique output
value
They produce an output of a fixed length, regardless of the length of the input.
The hash function is one-way (meaning that it is extremely hard to determine the
input when provided with the output).
The hash function is collision free (meaning that it is extremely hard to find two
messages that produce the same hash value)
Secure Hash Algorithm (SHA)
It is important to note that SHA2 has four variants (SHA-256, SHA-224 and SHA-
384)They accept an input of any length.
Digitally signed messages assure the recipient that the message truly came from
the claimed sender : nonrepudiation
Digitally signed messages assure the recipient that the message was not altered
while in transit between the sender and recipient : message integrity
HMAC relies on a shared secret key, therefore suitable for application where
symmetric key cryptography is appropriate
Digital Signature Standard (DSS)
There are a few simple rules to help keep these concepts straight in your mind when
preparing for the exam:
If you want to decrypt a message sent to you, use your private key.
If you want to digitally sign a message you are sending to someone else, use your private
key.
If you want to verify the signature on a message sent by someone else, use the sender's
public key
3.7 SSL, TLS and PKI
Infrastructure
Public Key Infrastructure
Digital certificates provide communicating parties with the assurance that the people
they are communicating with truly are who they claim to be
Certificates are signed by Certificate authorities (CA) and contain following information
:
Version of X.509, Serial number, Signature algorithm identifier, Issuer name
Validity period, Subject's Common Name (CN) (certificate owner), Subject's public key
Individual users
Email addresses
To obtain a digital certificate from a reputable CA, you must prove your identity to the satisfaction
of the CA.
Major CAs who provide widely accepted digital certificates:
Symantec, IdenTrust, Amazon Web Services, GlobalSign, Comodo, Certum, GoDaddy, DigiCert, Secom, LetsEncrypt.....
Certificate authorities issue different types of certificates depending upon the level of identity
verification that they perform:
Domain Validation (DV) certificates, where the CA simply verifies that the certificate subject has control of the domain name.
Extended Validation (EV) certificates provide a higher level of assurance and the CA takes steps to verify that the certificate owner is a legitimate business
Certificate Verification and formats
You can use three techniques to verify the authenticity of certificates and identify revoked
certificates:
Certificate Revocation Lists (CRLs): latency issue
Online Certificate Status Protocol (OCSP) : online and real time certificate verification
Certificate Stapling : an extension of OCSP
Digital certificates are stored in files, and those files come in a variety of different formats, both
binary and text-based:
Distinguished Encoding Rules (.DER, .CRT, .CER) format in binary, where the CA simply verifies that the certificate subject has control of the domain name.
The Privacy Enhanced Mail (PEM) certificate format in ASCII (.pem, .crt). Linux systems
The Personal Information Exchange (PFX) format in binary (.pfx) .Windows systems
P7B certificates in ASCII for windows systems
Certificate formats
End of Module 3
LAB 1 : Installation of Kleopatra
Email encryption with OpenPGP
Hash calculation using Linux and online tools
Note
PGP can be used for both email encryption and disk encryption. But SMIME can
only be used for email encryption.
39