401.4 Mind Map Cryptography
401.4 Mind Map Cryptography
Cryptology The method of deriving the plaintext or the encryption key from a
ciphertext to obtain information. Also to pass altered or fake
Cryptanalysis messages to deceive the original recipient
Block cipher: Obtained by segregating plaintext into blocks of n
characters or bits and applying the identical encryption algorithm
and key to each block
Cipher: A cryptographic transformation that operates on characters
or bits
Ciphertext or cryptogram: An unintelligible message.
Clustering: Situation in which a plaintext message generates
identical ciphertext messages using the same transfonnation
algorithm, but with different crypto variables or keys.
key terms Codes: A cryptographic transformation that operates at the level of
words or phrases
Cryptanalysis: Act of obtaining the plaintext or key from ciphertext
that is used to obtain valuable information and to pass on altered or
fake messages to deceive the original intended recipient.
Cryptographic algorithm: A step-by-step procedure used to
encipher plaintext and decipher ciphertext.
Plaintext: A message in cleartext, readable form.
Cryptography: "Hidden writing"
Encryption: Coding a message so that its meaning is concealed
core components of Cryptography
Plaintext: Message in its original form
Ciphertext: Message in its encrypted form
A cryptosystem is the collection of all possible inputs and all possible
outputs, in addition to the algorithm and keys. But, don't forget about
the humans
cryptosystem
Good cryptography rijndael algorithm,,To break you need 14 trillion years
Keys permit the existence of unrestricted algorithms
Keys might be any one of a large number of values
Keys
The strength of a cryptosystem rests with the strength of its keys
Keyspace matters
Crypto Fundamentals
TO encrypt a message, we might choose either symmetric
algorithms, such as RC4 or Blowfish, or asymmetric algorithms,
such as RSA or ECC.
digitally sign a message (that is, give some type of "digital proof" as
to the signer's identity), we might choose RSA or ECC with a
hashing algorithm, but not any of the symmetric algorithms
if we need high-speed encryption with the advantage of digital
signatures, we might choose DiffieHellman to exchange a symmetric
Big Picture key, hash our message using SHA, digitally sign the hash using
RSA, and encrypt the message and hash for transmission using
Rijndael
Keeps the same letters, but changes the position within the text
General methods of Stego Substitution Data in a file can be replaced or substituted with hidden text
The hidden data can also be used to generate a new file
File generation
No host file is needed
Stegexpose
Tools to detect Stego
Detecting Stego StegSecret
No universal way to detect steganography
Histograms are graphical representations of the number of
occurrences of data in a given distribution of such data
For example, a histogram of a text document would show the
Histograms number of occurrences of each character that appears in the
document. A normal text document would generate a histogram that
shows that the frequency of characters varies greatly
The RSA algorithm has been widely implemented all over the world
in all kinds of cryptography-enabled applications
It can be used to support both encryption and digital signature
schemes
RSA
As a central part of the Secure Sockets Layer (SSL)
it is also included in major web clients, such as Microsoft Internet
Explorer
asymmetric cryptosystems " (Public) Key " ECCs are capable of supporting both an encryption/decryption
scheme and a digital signature scheme.
High security even at relatively small key lengths (that is, a higher
strength per bit), high-speed implementations, low processing power
Elliptic Curve Cryptosystems (ECCs) requirements, and low storage requirements
ECC a particularly attractive cryptographic option for use in
resourceconstrained computing environments such as mobile
telephones, information appliances, and smart cards
MDS takes variable-length input Output is 128~bit unique fingerprint
MDS Typically used with digital evidence
sha1 "EOL" Output is l60 bit
hash
SHA-256 Output is256-bit
SHA sha2
SHA-512 Output is 512-bit
SHA3-256 Output is 2S6-bit
sha3
SHA3-512 Outputis 512-bit
VPN breakdown
Data at rest
GNU Privacy Guard (GPG)
Applying Cryptography Using GPG To encrypt or sign content, it is as easy as clicking an icon s
Encrypting information
Decrypting information
GPG provides 4 main functions
Signing information
Verifying a signature
GPG also provides an interface for key management, which is
critical for performing these functions
PKI provides a technical mechanism for encrypting an
organization's data
A hierarchy of infrastructure systems is used to create digital
certificates
Digital certificates contain the public key
Creating certificates
A PKI provides a managed infrastructure for Maintaining certificates
Revokingcel'ti
Certificate registration
Certificate creation
Certificate distribution
Public key infrastructure (PKI) The traditional PKI certificate life cycle includes Certificate validation
Certificate key recovery
Certificate expiration
Certificate revocation
Certification occurs when the CA actually issues-the certificate,
which includes the user's DN, public key, and certificate details
such as validity period, protected by a signature generated by the
CA
the cetiificate can be stored in a certificate server, such as an
LDAP
Public keys
Private client-side keys
several facets of a key storage
Private server-side keys
Private CA root and subordinate keys
An essential part of PKI
Digital document attesting the binding of an entity to a public key
Certificates Unique to each entity
Equivalent to a passport or driver's license
Mitigates impersonation
Standard for digital certificates is the x.509 certificate
Demographic data
Digital certificates Validity period
Each certificate contains Supported encryption algorithm
Public/private key
Signature by issuing CA
Public or private keys can be used for multiple forms of encryption
Digital certificates A Certificate Revocation List (CRL) is a list of revoked digital
certificates Often due to private key compromise
Key management
A Certificate Revocation List (CRL) The entire list must be downloaded each time it is updated
CRLs have limitations CRL downloads can be network-intensive
CRLs do not offer real-time notification of a revoked certificate
Request status of an individual serial number
OCSP is designed to replace CRLs Real-time notification of revoked certifications
OCSP - Online Certificate Status Protocol Lower bandwidth and storage requirements
OCSP is recommended by the IETF over CR
is a company or organization that acts to validate the identities of
entities (such as websites, email addresses, companies, or
individual persons) and bind them to cryptographic keys through the
issuance of electronic documents known as digital certificates. A
digital certificate
Authentication, by serving as a credential to validate the identity of
Certificate authorities (CA) the entity that it is issued to.
Encryption, for secure communication over insecure networks such
provides as the Internet
Integrity of documents signed with the certificate so that they cannot
be altered by a third party in transit
One use of PKI is to encrypt messages between a web server and a
web browser
Secure Sockets Layer (SSL)
This is accomplished by the use of either
Transport Layer Security (TLS)
Client and server use a PKI certificate (asymmetric) to negotiate a
session key (symmetric)
PKI certificate is used for secure key exchange
Session key is used to encrypt data between systems
Key Establishment
Confidentiality with symmetric encryption
SSL/TLS is expanding today into more than websites Both SSL and TLS protocols provide for:
Secure Socket Layer (SSL) Signature via asymmetric
Integrity via hash
PKI can be used for more than secure web traffic. It can also be
Other Uses of PKI used for:
Competing/incomplete standards
Certification of CAs Important issue, but easy to overlook
problems with PKI Do-it-yourself or outsource?
Extensive planning requirement
User education and/or perception
DR Planning Mistakes
Comparison of the cost of implementing countermeasures with the Make sure to show cost-benefit analysis
value of the reduced risk Allows look at multiple options to reduce a risk, including
compensating controls
Cost-Benefit Analysis
Importantto show that this Is high priority risk and the solution is the
most cost effective for reducing it
Includes the interim report results
Safeguard selection Including easy-to-do tasks that have already been implemented
final report Risk mitigation analysis
Cost-benefit analysis
Recommendations