SlideShare una empresa de Scribd logo
1 de 38
1 
ITNS and CERIAS 
CISSP Luncheon Series: 
Cryptography 
Presented by 
Addam Schroll, CISSP
Outline 
 History 
 Terms & Definitions 
 Symmetric and Asymmetric Algorithms 
 Hashing 
 PKI Concepts 
 Attacks on Cryptosystems 
2
Introduction 
 “Hidden writing” 
 Increasingly used to protect 
information 
 Can ensure confidentiality 
• Integrity and Authenticity too 
3
History – The Manual Era 
 Dates back to at least 2000 B.C. 
 Pen and Paper Cryptography 
 Examples 
• Scytale 
• Atbash 
• Caesar 
• Vigenère 
4
History – The Mechanical Era 
 Invention of cipher machines 
 Examples 
• Confederate Army’s Cipher Disk 
• Japanese Red and Purple Machines 
• German Enigma 
5
History – The Modern Era 
 Computers! 
 Examples 
• Lucifer 
• Rijndael 
• RSA 
• ElGamal 
6
Speak Like a Crypto Geek 
Plaintext – A message in its natural format 
readable by an attacker 
Ciphertext – Message altered to be unreadable 
by anyone except the intended recipients 
Key – Sequence that controls the operation and 
behavior of the cryptographic algorithm 
Keyspace – Total number of possible values of 
keys in a crypto algorithm 
7
Speak Like a Crypto Geek (2) 
Initialization Vector – Random values used with 
ciphers to ensure no patterns are created 
during encryption 
Cryptosystem – The combination of algorithm, 
key, and key management functions used to 
perform cryptographic operations 
8
Cryptosystem Services 
 Confidentiality 
 Integrity 
 Authenticity 
 Nonrepudiation 
 Access Control 
9
Types of Cryptography 
 Stream-based Ciphers 
• One at a time, please 
• Mixes plaintext with key stream 
• Good for real-time services 
 Block Ciphers 
• Amusement Park Ride 
• Substitution and transposition 
10
Encryption Systems 
 Substitution Cipher 
• Convert one letter to another 
• Cryptoquip 
 Transposition Cipher 
• Change position of letter in text 
• Word Jumble 
 Monoalphabetic Cipher 
• Caesar 
11
Encryption Systems 
 Polyalphabetic Cipher 
• Vigenère 
 Modular Mathematics 
• Running Key Cipher 
 One-time Pads 
• Randomly generated keys 
12
Steganography 
 Hiding a message within another 
medium, such as an image 
 No key is required 
 Example 
• Modify color map of JPEG image 
13
Cryptographic Methods 
 Symmetric 
• Same key for encryption and decryption 
• Key distribution problem 
 Asymmetric 
• Mathematically related key pairs for 
encryption and decryption 
• Public and private keys 
14
Cryptographic Methods 
 Hybrid 
• Combines strengths of both methods 
• Asymmetric distributes symmetric key 
» Also known as a session key 
• Symmetric provides bulk encryption 
• Example: 
» SSL negotiates a hybrid method 
15
Attributes of Strong 
Encryption 
 Confusion 
• Change key values each round 
• Performed through substitution 
• Complicates plaintext/key relationship 
 Diffusion 
• Change location of plaintext in 
ciphertext 
• Done through transposition 
16
Symmetric Algorithms 
 DES 
• Modes: ECB, CBC, CFB, OFB, CM 
 3DES 
 AES 
 IDEA 
 Blowfish 
17
Symmetric Algorithms 
 RC4 
 RC5 
 CAST 
 SAFER 
 Twofish 
18
Asymmetric Algorithms 
 Diffie-Hellman 
 RSA 
 El Gamal 
 Elliptic Curve Cryptography (ECC) 
19
Hashing Algorithms 
 MD5 
• Computes 128-bit hash value 
• Widely used for file integrity checking 
 SHA-1 
• Computes 160-bit hash value 
• NIST approved message digest 
algorithm 
20
Hashing Algorithms 
 HAVAL 
• Computes between 128 and 256 bit 
hash 
• Between 3 and 5 rounds 
 RIPEMD-160 
• Developed in Europe published in 1996 
• Patent-free 
21
Birthday Attack 
 Collisions 
• Two messages with the same hash 
value 
 Based on the “birthday paradox” 
 Hash algorithms should be resistant 
to this attack 
22
Message Authentication 
Codes 
 Small block of data generated with a 
secret key and appended to a 
message 
 HMAC (RFC 2104) 
• Uses hash instead of cipher for speed 
• Used in SSL/TLS and IPSec 
23
Digital Signatures 
 Hash of message encrypted with private 
key 
 Digital Signature Standard (DSS) 
• DSA/RSA/ECD-SA plus SHA 
 DSS provides 
• Sender authentication 
• Verification of message integrity 
• Nonrepudiation 
24
Encryption Management 
 Key Distribution Center (KDC) 
• Uses master keys to issue session keys 
• Example: Kerberos 
 ANSI X9.17 
• Used by financial institutions 
• Hierarchical set of keys 
• Higher levels used to distribute lower 
25
Public Key Infrastructure 
 All components needed to enable 
secure communication 
• Policies and Procedures 
• Keys and Algorithms 
• Software and Data Formats 
 Assures identity to users 
 Provides key management features 
26
PKI Components 
 Digital Certificates 
• Contains identity and verification info 
 Certificate Authorities 
• Trusted entity that issues certificates 
 Registration Authorities 
• Verifies identity for certificate requests 
 Certificate Revocation List (CRL) 
27
PKI Cross Certification 
 Process to establish a trust 
relationship between CAs 
 Allows each CA to validate 
certificates issued by the other CA 
 Used in large organizations or 
business partnerships 
28
Cryptanalysis 
 The study of methods to break 
cryptosystems 
 Often targeted at obtaining a key 
 Attacks may be passive or active 
29
Cryptanalysis 
 Kerckhoff’s Principle 
• The only secrecy involved with a 
cryptosystem should be the key 
 Cryptosystem Strength 
• How hard is it to determine the secret 
associated with the system? 
30
Cryptanalysis Attacks 
 Brute force 
• Trying all key values in the keyspace 
 Frequency Analysis 
• Guess values based on frequency of 
occurrence 
 Dictionary Attack 
• Find plaintext based on common words 
31
Cryptanalysis Attacks 
 Replay Attack 
• Repeating previous known values 
 Factoring Attacks 
• Find keys through prime factorization 
 Ciphertext-Only 
 Known Plaintext 
• Format or content of plaintext available 
32
Cryptanalysis Attacks 
 Chosen Plaintext 
• Attack can encrypt chosen plaintext 
 Chosen Ciphertext 
• Decrypt known ciphertext to discover 
key 
 Differential Power Analysis 
• Side Channel Attack 
• Identify algorithm and key length 
33
Cryptanalysis Attacks 
 Social Engineering 
• Humans are the weakest link 
 RNG Attack 
• Predict IV used by an algorithm 
 Temporary Files 
• May contain plaintext 
34
E-mail Security Protocols 
 Privacy Enhanced Email (PEM) 
 Pretty Good Privacy (PGP) 
• Based on a distributed trust model 
• Each user generates a key pair 
 S/MIME 
• Requires public key infrastructure 
• Supported by most e-mail clients 
35
Network Security 
 Link Encryption 
• Encrypt traffic headers + data 
• Transparent to users 
 End-to-End Encryption 
• Encrypts application layer data only 
• Network devices need not be aware 
36
Network Security 
 SSL/TLS 
• Supports mutual authentication 
• Secures a number of popular network 
services 
 IPSec 
• Security extensions for TCP/IP protocols 
• Supports encryption and authentication 
• Used for VPNs 
37
Questions? 
38

Más contenido relacionado

La actualidad más candente

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3limsh
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2limsh
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 

La actualidad más candente (20)

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Cryptography in Python
Cryptography in PythonCryptography in Python
Cryptography in Python
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
 
Cryptography
Cryptography Cryptography
Cryptography
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
 
Security
SecuritySecurity
Security
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 

Destacado

3 Telecom+Network Part1
3 Telecom+Network Part13 Telecom+Network Part1
3 Telecom+Network Part1Alfred Ouyang
 
3 Telecom+Network Part2
3 Telecom+Network Part23 Telecom+Network Part2
3 Telecom+Network Part2Alfred Ouyang
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2Alfred Ouyang
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation10 Legal+Compliance+Investigation
10 Legal+Compliance+InvestigationAlfred Ouyang
 

Destacado (8)

3 Telecom+Network Part1
3 Telecom+Network Part13 Telecom+Network Part1
3 Telecom+Network Part1
 
3 Telecom+Network Part2
3 Telecom+Network Part23 Telecom+Network Part2
3 Telecom+Network Part2
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 

Similar a Cryptography

CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
CompTIASecPLUS-Part6 -  UnlimitedEdited.pptxCompTIASecPLUS-Part6 -  UnlimitedEdited.pptx
CompTIASecPLUS-Part6 - UnlimitedEdited.pptxmohedkhadar60
 
Cryptography
CryptographyCryptography
CryptographyPPT4U
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: CryptographySam Bowne
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptxMaryam522887
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...zachdwg
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
501 ch 10 cryptography
501 ch 10 cryptography501 ch 10 cryptography
501 ch 10 cryptographyToyeeb Onimole
 
Encryption pres
Encryption presEncryption pres
Encryption presMereySovet
 

Similar a Cryptography (20)

CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
CompTIASecPLUS-Part6 -  UnlimitedEdited.pptxCompTIASecPLUS-Part6 -  UnlimitedEdited.pptx
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
501 ch 10 cryptography
501 ch 10 cryptography501 ch 10 cryptography
501 ch 10 cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Encryption pres
Encryption presEncryption pres
Encryption pres
 

Último

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlkumarajju5765
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 

Último (20)

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 

Cryptography

  • 1. 1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP
  • 2. Outline  History  Terms & Definitions  Symmetric and Asymmetric Algorithms  Hashing  PKI Concepts  Attacks on Cryptosystems 2
  • 3. Introduction  “Hidden writing”  Increasingly used to protect information  Can ensure confidentiality • Integrity and Authenticity too 3
  • 4. History – The Manual Era  Dates back to at least 2000 B.C.  Pen and Paper Cryptography  Examples • Scytale • Atbash • Caesar • Vigenère 4
  • 5. History – The Mechanical Era  Invention of cipher machines  Examples • Confederate Army’s Cipher Disk • Japanese Red and Purple Machines • German Enigma 5
  • 6. History – The Modern Era  Computers!  Examples • Lucifer • Rijndael • RSA • ElGamal 6
  • 7. Speak Like a Crypto Geek Plaintext – A message in its natural format readable by an attacker Ciphertext – Message altered to be unreadable by anyone except the intended recipients Key – Sequence that controls the operation and behavior of the cryptographic algorithm Keyspace – Total number of possible values of keys in a crypto algorithm 7
  • 8. Speak Like a Crypto Geek (2) Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations 8
  • 9. Cryptosystem Services  Confidentiality  Integrity  Authenticity  Nonrepudiation  Access Control 9
  • 10. Types of Cryptography  Stream-based Ciphers • One at a time, please • Mixes plaintext with key stream • Good for real-time services  Block Ciphers • Amusement Park Ride • Substitution and transposition 10
  • 11. Encryption Systems  Substitution Cipher • Convert one letter to another • Cryptoquip  Transposition Cipher • Change position of letter in text • Word Jumble  Monoalphabetic Cipher • Caesar 11
  • 12. Encryption Systems  Polyalphabetic Cipher • Vigenère  Modular Mathematics • Running Key Cipher  One-time Pads • Randomly generated keys 12
  • 13. Steganography  Hiding a message within another medium, such as an image  No key is required  Example • Modify color map of JPEG image 13
  • 14. Cryptographic Methods  Symmetric • Same key for encryption and decryption • Key distribution problem  Asymmetric • Mathematically related key pairs for encryption and decryption • Public and private keys 14
  • 15. Cryptographic Methods  Hybrid • Combines strengths of both methods • Asymmetric distributes symmetric key » Also known as a session key • Symmetric provides bulk encryption • Example: » SSL negotiates a hybrid method 15
  • 16. Attributes of Strong Encryption  Confusion • Change key values each round • Performed through substitution • Complicates plaintext/key relationship  Diffusion • Change location of plaintext in ciphertext • Done through transposition 16
  • 17. Symmetric Algorithms  DES • Modes: ECB, CBC, CFB, OFB, CM  3DES  AES  IDEA  Blowfish 17
  • 18. Symmetric Algorithms  RC4  RC5  CAST  SAFER  Twofish 18
  • 19. Asymmetric Algorithms  Diffie-Hellman  RSA  El Gamal  Elliptic Curve Cryptography (ECC) 19
  • 20. Hashing Algorithms  MD5 • Computes 128-bit hash value • Widely used for file integrity checking  SHA-1 • Computes 160-bit hash value • NIST approved message digest algorithm 20
  • 21. Hashing Algorithms  HAVAL • Computes between 128 and 256 bit hash • Between 3 and 5 rounds  RIPEMD-160 • Developed in Europe published in 1996 • Patent-free 21
  • 22. Birthday Attack  Collisions • Two messages with the same hash value  Based on the “birthday paradox”  Hash algorithms should be resistant to this attack 22
  • 23. Message Authentication Codes  Small block of data generated with a secret key and appended to a message  HMAC (RFC 2104) • Uses hash instead of cipher for speed • Used in SSL/TLS and IPSec 23
  • 24. Digital Signatures  Hash of message encrypted with private key  Digital Signature Standard (DSS) • DSA/RSA/ECD-SA plus SHA  DSS provides • Sender authentication • Verification of message integrity • Nonrepudiation 24
  • 25. Encryption Management  Key Distribution Center (KDC) • Uses master keys to issue session keys • Example: Kerberos  ANSI X9.17 • Used by financial institutions • Hierarchical set of keys • Higher levels used to distribute lower 25
  • 26. Public Key Infrastructure  All components needed to enable secure communication • Policies and Procedures • Keys and Algorithms • Software and Data Formats  Assures identity to users  Provides key management features 26
  • 27. PKI Components  Digital Certificates • Contains identity and verification info  Certificate Authorities • Trusted entity that issues certificates  Registration Authorities • Verifies identity for certificate requests  Certificate Revocation List (CRL) 27
  • 28. PKI Cross Certification  Process to establish a trust relationship between CAs  Allows each CA to validate certificates issued by the other CA  Used in large organizations or business partnerships 28
  • 29. Cryptanalysis  The study of methods to break cryptosystems  Often targeted at obtaining a key  Attacks may be passive or active 29
  • 30. Cryptanalysis  Kerckhoff’s Principle • The only secrecy involved with a cryptosystem should be the key  Cryptosystem Strength • How hard is it to determine the secret associated with the system? 30
  • 31. Cryptanalysis Attacks  Brute force • Trying all key values in the keyspace  Frequency Analysis • Guess values based on frequency of occurrence  Dictionary Attack • Find plaintext based on common words 31
  • 32. Cryptanalysis Attacks  Replay Attack • Repeating previous known values  Factoring Attacks • Find keys through prime factorization  Ciphertext-Only  Known Plaintext • Format or content of plaintext available 32
  • 33. Cryptanalysis Attacks  Chosen Plaintext • Attack can encrypt chosen plaintext  Chosen Ciphertext • Decrypt known ciphertext to discover key  Differential Power Analysis • Side Channel Attack • Identify algorithm and key length 33
  • 34. Cryptanalysis Attacks  Social Engineering • Humans are the weakest link  RNG Attack • Predict IV used by an algorithm  Temporary Files • May contain plaintext 34
  • 35. E-mail Security Protocols  Privacy Enhanced Email (PEM)  Pretty Good Privacy (PGP) • Based on a distributed trust model • Each user generates a key pair  S/MIME • Requires public key infrastructure • Supported by most e-mail clients 35
  • 36. Network Security  Link Encryption • Encrypt traffic headers + data • Transparent to users  End-to-End Encryption • Encrypts application layer data only • Network devices need not be aware 36
  • 37. Network Security  SSL/TLS • Supports mutual authentication • Secures a number of popular network services  IPSec • Security extensions for TCP/IP protocols • Supports encryption and authentication • Used for VPNs 37

Notas del editor

  1. Cryptography – Greek for hidden and writing is a means of transforming data in a way that renders it unreadable by anyone except the intended recipient. What was originally used almost exclusively by governments for espionage has become a powerful tool for personal privacy today. Every modern computer system uses modern cryptographic methods to secure passwords stored and provides the trusted backbone for e-commerce (think lock icon). Cryptography fits into the CIA triad, as it can be used to ensure confidentiality and integrity of a message. Some forms also provide for sender authenticity and proof of delivery. But cryptography doesn’t address availability as some other forms of security do. Although forgetting a password for your user account can certainly lead to a denial of service attack. However, cryptography is used in many access control systems
  2. The history of cryptography begins where many stories of history do…. in ancient Egypt with hieroglyphics. Scytale – Spartan method involved wrapping a belt around a rod of a given diameter and length Atbash – Hewbrew cipher which mirrored the normal alphabet (shown in The DaVinci Code) Caesar – Shift all letters by a given number of letters in the alphabet Vignère – Use of a key and multiple alphabets to hide repeated characters in an encrypted message
  3. The history of cryptography begins where many old tales do…. in ancient Egypt with hieroglyphics. These were not meant to hide messages so much as to give a formal and ceremonial touch to stories of everyday events. During the industrial age, cryptography was moved from a manual exercise to one done by machines. The invention of cipher disks and rotors for this use allowed for the creation of much more complex algorithms.
  4. Modern computing gave cryptographers vast resources for improving the complexity of cryptosystems as well as for attacking them. And with the spread of personal computing, electronic commerce, and personal privacy concerns, use of encryption has spread beyond its traditional uses in military and government applications.
  5. Just like with many technical topics, Cryptography has its own lingo. Learning and using these terms and their definitions are the key to speaking like a crypto geek.
  6. So why do care about cryptography? Well, here’s what it can do for us. Confidentiality – Only authorized entities are allowed to view Integrity – Ensures the message was not altered by unauthorized individuals Authenticity – Validates the source of a message, to ensure the sender is properly identified Nonrepudiation – Establishes sender identity so that the entity cannot deny having sent the message Access Control – Access to an object requires access to the associated crypto keys in many systems (e.g. login)
  7. Stream Ciphers are fast and easy to implement in hardware. Block ciphers are stronger, but slower and often implemented in hardware.
  8. Substitution Cipher: Replacing one letter with another Transposition Cipher: World Jumble. Rearranging or reordering the letters within a message Monoalphabetic Cipher: Algorithm that substitutes one letter in the ciphertext alphabet for one in the plaintext alphabet
  9. Polyalphabetic Cipher: Algorithm that substitutes a letter from two or more ciphertext alphabets for each plaintext alphabet letter based on position in the message. Modular Mathemaitcs: Sometimes referred to as “clock arithmetic”, computes operations over a given range of values from 0 to N. Referred to as modulo N. One-time Pads: Offer perfect secrecy if a true source of randomness is used, but is very difficult to use in practice.
  10. Invisible ink, hidden tattoos, and microdots are all examples of steganography. By taking a color digital image and slightly altering the color of each pixel, you can hide a message in the image without noticeably altering the appearance. The receiver can then extract the message if they have the original, unaltered image.
  11. Cryptographic Algorithms generally fall into one of two different categories, or are a combination of both. Symmetric Fast Only provide confidentiality Need secure channel for key distribution Key management headaches from large number of key pairs to maintain N(N-1)/2 That’s over 6.3 million key pairs to let all 3556 Purdue A/P staff members exchange encrypted messages To do the same for all students would require over half a billion key pairs! Examples: DES, AES, Blowfish, RC4, RC5 Asymmetric Large mathematical operations make it slower than symmetric algorithms No need for out of band key distribution (public keys are public!) Scales better since only a single key pair needed per individual Can provide authentication and nonrepudiation Examples: RSA, El Gamal, ECC, Diffie-Hellman
  12. A hybrid cryptosystem is the best of both worlds. In this case, an asymmetric encryption scheme is used to transmit a generated symmetric key to the other party, then that key is used for all further communications. This combines the scalability and key management features of the asymmetric algorithms with the speed of symmetric ones. The Secure Sockets Layer (SSL) protocol negotiates which asymmetric and symmetric algorithms to use in a hybrid system to protect TCP connections, such as an HTTP connection between a web browser and web server.
  13. Strong encryption uses a combination of both of these attributes to attain a sufficiently complex algorithm.
  14. DES (Data Encryption Standard) 64 bit key that is effectively 56 bits in strength Actual algorithm is called DEA (Data Encryption Algorithm) DES Modes Electronic Code Book Cipher Block Chaining (most commonly used for general purpose encryption) Cipher Feedback Output Feedback Counter Mode (used in IPSec) 3DES 112-bit effective key length Uses either 2 or 3 different smaller keys in one of several modes Modes EEE2/3 EDE2/3 AES NIST replaced DES in 1997 with this Uses the Rijndael algorithm Supports key/block sizes of 128, 192, and 256 bits Uses 10/12/14 rounds as block size increases IDEA (International Data Encryption Algorithm) Operates on 64 bit blocks in 8 rounds with 128 bit key Considered stronger than DES and is used in PGP Blowfish 64 bit block cipher with up to 448 bit key and 16 rounds Designed by Bruce Schneier
  15. RC4 Stream cipher with variable key size created by Ron Rivest RC5 Another Rivest cipher Block cipher with 32/64/128 bit blocks and keys up to 2048 bits RC6 Beefier version of RC5 submitted as AES candidate CAST 64 bit block cipher with keys between 40-128 bits with 12-16 rounds depending on key length CAST-256 used 128-bit blocks and keys from 128-256 bits using 48 rounds SAFER (Secure and Fast Encryption Routine) Set of patent-free algorithms in 64 and 128 bit block variants Variation used in Bluetooth Twofish Adapted version of Blowfish with 128 bit blocks, 128-256 bit keys and 16 rounds AES Finalist
  16. Diffie-Hellman (1976) First widely known public key cryptography algorithm Computes discrete logarithms over a finite field Provides means for secure key exchange over insecure channel RSA (1977) Stands for inventors names, Rivest, Shamir, and Adleman Relies on difficulty of finding prime factorization of large numbers El Gamal (1984) Based on Diffie-Hellman method of computing discrete logarithms Can also be used for message confidentiality and digital signature services Elliptic Curve Cryptography (1985) Relies on computing discrete logarithms over elliptic curve group Due to difficulty of problem, key sizes can be much smaller than RSA and still retain strength
  17. MD-5 is based on MD-4 and was created to address vulnerabilities found in MD-4. MD5 generates 128-bit hash values over 512-bit blocks in 4 rounds of 16 steps each. SHA-1 also operates on 512-bit blocks, but produces a 160-bit hash value in 4 rounds of 20 steps each.
  18. HAVAL was developed at the University of Wollongong in Australia. It has a number of different modes of operation based on the chosen output size and number of rounds. HAVAL operates on 1024-bit blocks. RIPEMD-160 was developed by the European RACE integrity Primitives Evaluation Project. The output size is 160 bits and operates on 512-bit blocks. RIPEMD-160 performs 5 paired rounds with 16 steps each.
  19. Traditional MAC is generated using DES-CBC and is just the last block of ciphertext created when encrypting the message itself. This can be appended to the plaintext to be used as a MAC. Unfortunately, DES and other encryption mechanisms can be somewhat slow compared to a hash function. So the HMAC standard was created which allows using a hash algorithm with a secret key “mixed in” to improve the speed while providing message integrity and authentication.
  20. The hash is encrypted instead of the message itself for performance reasons. Encrypting a large document with a private key is a much more time consuming process than taking the hash of the same message and then encrypting that hash. The Digital Signature Standard (DSS) includes the following asymmetric key and message digest algorithms. Digital Signature Algorithm (DSA) RSA Elliptic Curve Distribution (Signature Algorithm) SHA (Message Digest) DSS is a US government standard and is used in e-commerce, e-mail, and financial transactions on a daily basis.
  21. Encryption Management Features include: Issuance (CA, KDC, Directory) Revocation (CRL) Recovery (Key Escrow) Distribution (Directory) History (Archival and Backup) KDC Master key pairs are generated for each user and the KDC. A session key is generated by the KDC and distributes to each party of the communication, encrypted with their master key. ANSI X9.17 This standard defines up to three levels of keys: KKMs : Master key-encrypting keys (distributed manually) KKs : Key-encrypting keys DKs : Data keys
  22. Policies and Procedures are the most difficult part of implementing a PKI. Key Management Features include: Issuance (CA) Revocation (CRL) Recovery (Key Escrow) Distribution (Directory) History (Archival/Escrow)
  23. Digital certificates adhere to the X.509 certificate standard format. Currently in version 3. CRLs are maintained by the CA and list all certificates that have been revoked. Clients are supposed to check if a certificate has been revoked before using it, but this is not always the case in practice.
  24. PEM First in the field, but never really caught on and was superseded by others such as S/MIME Generally had too strict of PKI requirements to be feasible for many organizations. PGP Uses a “web of trust” distributed trust model where each user is an authority Key revocation is difficult due to the distributed nature of the web Originally designed by Phil Zimmerman and released in 1991 S/MIME Secure Multipurpose Internet Mail Extension Standard for encrypting and signing electronic mail which extends the MIME standard Uses X.509 certificates
  25. Link Encryption involves performing encryption at the physical or data link layers of the OSI network model to protect confidentiality of information within the communications channel only. The link routing information itself is encrypted and must be decrypted by each device along the channel to determine the next receiver, then re-encrypted when transmitted. Link encryption can thwart attempts at traffic analysis, although it is typically costly due to the need to have specialized routing equipment along the path. The users, however, can be blissfully ignorant of the details of the encryption involved. Satellite TV is an example of a medium that uses link encryption. End-to-end encryption, however, only encrypts the application layer data being transmitted. Network devices can be “dumb” with regard to the encryption used, while users may have more flexibility in selecting the algorithms. Because only the data is protected in transit, E2E encryption doesn’t enjoy the same resistance to traffic analysis as link encryption.