Anda di halaman 1dari 1

Plaintext Encryption Ciphertext Decryption Plaintext Cryptosystem Strength Work Factor Confidentiality Cryptosystem Services Integrity Authentication Authorization

Nonrepudiation Cipher-only attack - attacker has ciphertext of several messages Known-plaintext attack attacker has plaintext and corresponding ciphertext Chosen-Plaintext attack attacker has the plaintext and ciphertext, but can choose the plaintext that get encrypted to see the corresponding ciphertext. Chosen-Ciphertext attackattacker can chose the ciphertext to be decrypted and has access to the resulting decrypted plaintext. Differential Cryptanalysis attack looks at ciphertext pairs generated by encryption of plaintext pairs with specific differences and analyzes the effect and result of those differences. Linear Cryptanalysis - attacker carries out a known-plaintext attack on several different messages encrypted with the same key. Side-channel attack attacker observes how system works through different behaviors Replay attack - attacker captures some type of data and resubmits it with the hopes of fooling the receiving device into thinking it is legitimate information. Algebraic attack - analyze the vulnerabilities in the mathematics used within algorithm and exploit intrinsic algebraic structure. Analytic attack - attack algorithm's structural weaknesses and flaws. Statistical attack - identify statistical weaknesses in algorithm design for exploitation. Key - secret value for encryption Algorithm/Cipher Keyspace

Definitions and Concepts

Kerckhoffs' Principle Cryptanalysis Cryptography Cryptology

Key should be secret, but algorithm open

Pseudo-Random - if seeding value is predictable in any way, resulting values are not considered truly random Perfect Encryption scheme, considered unbreakable if implemented correctly. Must be only one time One-Time Pad Must be as long as message Must be securely protected and distributed Made of truly random values

Attacks

Running Key Cipher Concealment Cipher Steganography

Uses components for key in the physical world surrounding subject Message within a message.

Protection against sniffers and eavesdroppers Usually provided by service providers and is incorporated into network protocols. Link Encryption encrypts all the data along a specific communication path. Data is not encrypted is data link control messaging information. Packets must be decrypted at each hop so the router knows where to send packet next. Works at Data and physical Layers Provides traffic-flow security, attacker cannot learn basic information about data flows. Key distribution and management very complex More points of vulnerability, as packets decrypt at every hop. Defeats Traffic analysis. End-to-End encryption does not encrypt hears, addresses, routing and trailer information. Attacker could learn more about traffic. Packets do not need to be decrypted at each hop. Usually initiated by user of the originating computer. Provides more flexibility to determine what to encrypt. Works at Application layer.

Link Encryption vs End-toEnd Encryption

Sits on top of TCP/IP Stateless Protocol HTTP running over SSL SSL - Secure Sockets Layer uses public key encryption, provides data encryption, server authentication, message integrity and optional client authentication. SSL requires SSL-enabled server and client SSL works at Transport layer TLS is open community protocol, SSL is closed-source. Protects communication channel between two computers Technology that protects message sent between two computers. Used when individual message needs to be encrypted. Technology proposed by VIsa and Master Card to allow for more secure credit card transaction possibilities that what currently is available. SET - cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet. Issuer (cardholder's bank) Cardholder Merchant Acquirer(merchant bank) Payment Gateway To use SET user should enter credit card number to electronic wallet. It creates public and private key for encrypting financial information before it sent. Entities required

HTTP Substitution Transposition Algorithm contains possible ways how Substitution and Transposition can take place. Key dictates how it will happen. Master Key - on key that is used to create symmetric keys KDF - Key Derivation Function Two or more keys, created from Master key, called subkey KDF are used to generate keys that are made up of random values Cesar Cipher

HTTPS - HTTP Secure

Types of Ciphers

S-HHTP - Secure HTTP 64 Bit key. True key 56 Bit + 8 Bit for parity Incorporates padding if block of less than 64 bit is present Pins Easiest and fasted to used Challenge-response values Keys Databases and small amounts of text Each block is encrypted with the same key. Not enough randomness in the process, large data can help to crack code CBC - Cipher Block Chaining Uses IV for encryption of first block Can emulate stream cipher DES Cookies Modes CFB - Cipher Feedback Can be used when you send continuous stream of data to a destination. Like a terminal server connection Solves problem with corruption error Secure Shell (SSH)

ECB - Electronic Codebook Secure Electronic Transaction (SET)

Tunneling mechanism that provides terminal like access to remote computer Can be used for secure file transfer and port redirection Provides authentication and secure transmission over internet. Use Diffie-Hellman protocol for key exchange Protocol Suite provides method of setting up a secure channel for protected data exchange between two devices. Has strong encryption and authentication methods. Used for VPN and tunneling Authentication Header (AH) - authenticating protocol Encapsulation Security Payload (ESP) authenticating and encrypting protocol Payload and routing and header information are protected Payload of message is protected Tunneling Modes Transport Symmetric Algorithm DES-EEE3 - 3 keys for Encryption, Encryption, Encryption DES-EDE3 - 2 keys for Encryption, Decryption, Encryption DES-EEE2 - 2 keys for Encryption, Encryption, Encryption DES-EDE2 - 2 keys for Encryption, Decryption, Encryption Internet Protocol Security (IPSec) AES 128, 192, 256 Bits key size with 10, 12, 14 rounds of encryption respectively NIST Standard Rijndael Algorithm 64 bits blocks of data IDEA 128 Bits key Used in PGP Open source Algorithm Automated protocol management Key Management Blowfish 64 bits blocks of data 32-448 Bits key 16 rounds of cryptographic functions RC4 used in WEP RC4, RC5, RC6 S/MIME - Secure MIME - standard for encrypting and digitally signing electronic mail and for providing secure data transmissions. S/MIME Follows Public Key Cryptography Standard (PKCS) S/MIME provides confidentiality through encryption, integrity through hashing, authentication through use of X.509 certificates and non-repudiation through signed message digest. Compatible with PKCS Developed to provide compatibility with many types of key-management processes and symmetric and public key methods of encryption. Series of message authentication and encryption technologies Provides support for nonrepudiation X.400-compatible application level protocol used to secure email messages. Confidentiality by IDEA Integrity by MD5 Authentication by Public KEy certificates Nonrepudiation by cryptographically signed messages. Uses its own certificates Relies on Web of trust Key ring - file containing collection of public keys received from other users Quantum Cryptography LUC Key should not be stored as clear text outside the cryptography device. Key should be backed up and easily accessible when required. Key should be long enough to provide necessary level of protection Key should be stored and transmitted by secure means Keys should be extremely random, and algorithm should use full spectrum of key space. Key life time should correspond to sensitivity of the data it is protecting. The more key is used, the shorter lifetime will be. Keys should be properly destroyed when their lifetime comes to an end. Merkle-Hellman Knapsack Principles Asymmetric Algorithm Pretty Good Privacy (PGP) complete crypto system that uses cryptographic protection to protect email and files. Message Security Protocol (MSP) - military PEM. Privacy-Enhanced Mail (PEM) - Internet standard to provide secure email over Internet and for inhouse structures. EL Gamal MIME - specification indicating how multimedia data and e-mail attachments are to be transferred. 32, 64, 128 Block size of data 1028 bits key Number of rounds up to 255 Can be used for digital signatures, key exchange, encryption RSA Uses factoring large numbers Prime Number - positive whole number with no proper divisors can be used for digital signature, encryption and key exchange CTR - Counter Mode

Internet Security

OFB - Output Feedback

Used when you need to emulate stream of small data, but with reduced possibility of errors. Block size of ciphertext should be same as size of block of plaintext Uses IV Counter that increments for each plaintext block. No chaining involved. Encryption happens in parallel and performance increases. Used for encryption of ATM cells for virtual circuits, IPSec and Wi-Fi

Security Parameter Index (SPI) - keeps track of the different SAs and tell which is appropriate to invoke for different packets. Security Association (SA) - record of configurations the device needs to support an IPSec connection Can authenticate devices by using MAC. AH cannot be used with NAT. ESP has to be used in this case Manual management Internet Key Exchange (IKE) - de facto standard - combination of ISAKMP and OAKLEY Internet Security Association and Key Management Protocol (ISAKMP) is architecture independent of the type of keying mechanisms used. Provides infrastructure OAKLEY protocol carries out negotiation process. Uses infrastructure All protocols work at network layer. Simple Key Management Protocol for IP (SKIP) is another key exchange protocol same as IKE

CISSP Cryptography Domain

3DES

Performance is drawback. Slowest algorithm Usually extension of Diffie-Hellman algorithm Based on calculation of discrete logarithms.

Email standards Methods of Encryption


Diffie-Hellman

Uses Key agreement Does not provide encryption or digital signature Allows for Key distribution Vulnerable to Man-in-the-middle Can be used for encryption, digital signatures and key exchange Most efficient algorithm Elliptic Curve Based on computing discrete logarithms Used in devices with limited processing power. Provides same level of protection as RSA with shorter key size Based on Lucas Sequences Implements Discrete Logarithms Digital Signature is a hash value that has been encrypted with the sender's private key. Encryption provides confidentiality Digital Signature Algorithm Hashing provides integrity Digital Signature provides authentication, nonrepudiation and integrity Encryption and digital signature provide Confidentiality, integrity, authentication and nonrepudiation Based on knapsack problem Insecure algorithm and not currently used Information revealed on a need-toknow basis, without revealing all MD2 - 128 bit MD value MD4 128 bit MD value, higher speed than MD2 and optimized for microporcessors MD5 - 128 bit MD value, harder to break. Subject to collision attack Designed to be used with Digital Signature Standard SHA 1 - 160 bit, SHA256 - 256 bit, SHA384 - 384 bit and so on

Key Management

Zero Knowledge Proof

ISO Authentication framework that uses public key cryptography and X.509 Standard Hybrid system of symmetric and asymmetric algorithms RA - Registration Authority - verifies identity of certificate requester Cross Certification - process undertaken by CAs to establish trust relationship in which the rely upon each other's digital certificates and public keys as if they had issued them themselves. CRL - Certificate revocation list - list contains every certificate that has been revoked. Carries out real-time validation of certificate. Checks CRL that is maintained by CA. OCSP - Online Certificate Status Protocol automatically checks for revocation status of certificate in the background. Certificate - mechanism used to associate a public key with a collection of components in a manner that is sufficient to uniquely identify the claimed owner. Confidentiality Integrity Access control Authentication Nonrepudiation Block Cipher Services Confusion - substitution Diffusion - transposition Key stream Generator Initialization Vector Characteristics Stream Cipher Long Periods of no repeating patterns within key stream values Statistically unpredictable key stream A Key stream not linearly related to the key Statistically unbiased key-stream (as many 0's as 1's) Asymmetric and symmetric algorithms used together Hybrid Encryption Methods Session Keys Digital Envelopes

One-way Hash - variable length message calculated in to fixed length value, hash value CA - Certificate Authority - trusted organization that maintains and issues digital certificate Message Integrity

SHA - 160 bit MD value

Haval - variable length variation of MD5. 128 - 256 bit MD value Tiger - 192 bit MD value. HASH attacks Collision - same hash value for different messages Birthday attack

Public Key Infrastructure

HMAC - symmetric key concatenated to the message. HAshing CBC-MAC - message is encrypted with symmetric block cipher, and output of final block is used as MAC. CBC CMAC - Cipher based MAC. Variation of CBC-MAC MAC provides form of authentication Provides Data Origin Authentication, referred to as system authentication

x.509 Standard

MAC - Message authentication code authentication scheme derived by applying a secret key to a message in some form.

Anda mungkin juga menyukai