Top Banner
Cryptography Chapter 14
45

Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Dec 31, 2015

Download

Documents

May Garrett
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Cryptography

Chapter 14

Page 2: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Learning Objectives

Understand the basics of algorithms and how they are used in modern cryptography

Identify the differences between asymmetric and symmetric algorithms

Have a basic understanding of the concepts of cryptography and how they relate to network security

continued…

Page 3: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Learning Objectives

Discuss characteristics of PKI certificates and the policies and procedures surrounding them

Understand the implications of key management and a certificate’s lifecycle

Page 4: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Cryptography

Study of complex mathematical formulas and algorithms used for encryption and decryption

Allows users to transmit sensitive information over unsecured networks

Can be either strong or weak

Page 5: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Cryptography Terminology

Plaintext Data that can be read without any manipulation

Encryption Method of disguising plaintext to hide its substance

Ciphertext Plaintext that has been encrypted and is an unreadable

series of symbols and numbers

Page 6: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

How Encryption and Decryption Work

Page 7: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Algorithms

Mathematical functions that work in tandem with a key

Same plaintext data encrypts into different ciphertext with different keys

Security of data relies on: Strength of the algorithm Secrecy of the key

Page 8: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Hashing

Method used for verifying data integrity Uses variable-length input that is

converted to a fixed-length output string (hash value)

Page 9: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Symmetric versus Asymmetric Algorithms

Type of Algorithm

Advantages Disadvantages

Symmetric Single key Requires sender and receiver to agree on a key before transmission of data

Security lies only with the key

High cost

Asymmetric Encryption and decryption keys are different

Decryption key cannot be calculated from encryption key

Security of keys can be compromised when malicious users post phony keys

Page 10: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Symmetric Algorithms

Usually use same key for encryption and decryption

Encryption key can be calculated from decryption key and vice versa

Require sender and receiver to agree on a key before they communicate securely

Security lies with the key Also called secret key algorithms, single-key

algorithms, or one-key algorithms

Page 11: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Encryption Using aSymmetric Algorithm

Page 12: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Categories of Algorithms

Stream algorithms Operate on the plaintext one bit at a time

Block algorithms Encrypt and decrypt data in groups of bits,

typically 64 bits in size

Page 13: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Asymmetric Algorithms

Use different keys for encryption and decryption

Decryption key cannot be calculated from the encryption key

Anyone can use the key to encrypt data and send it to the host; only the host can decrypt the data

Also known as public key algorithms

Page 14: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Page 15: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Common Encryption Algorithms

Lucifer (1974) Diffie-Hellman

(1976) RSA (1977) DES (1977)

Triple DES (1998) IDEA (1992) Blowfish (1993) RC5 (1995)

Page 16: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Primary Functions of Cryptography

Confidentiality Authentication Integrity Nonrepudiation

Page 17: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Digital Signatures

Based on asymmetric algorithms, allow the recipient to verify whether a public key belongs to its owner

Page 18: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Page 19: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificates

Credentials that allow a recipient to verify whether a public key belongs to its owner Verify senders’ information with identity

information that is bound to the public key Components

Public key One or more digital signatures Certificate information (eg, user’s name, ID)

Page 20: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Public Key Infrastructure (PKI) Certificates

Certificate storage facility that provides certification management functionality (eg, ability to issue, revoke, store, retrieve, and trust certificates)

Certification authority (CA) Primary feature of PKI Trusted person or group responsible for issuing

certificates to authorized users on a system Creates certificates and digitally signs them using a

private key

Page 21: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

PKI Policies and Practices

Validity establishes that a public key certificate belongs to its owner

CA issues certificates to users by binding a public key to identification information of the requester

User can manually check certificate’s fingerprint

Page 22: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

PKI Revocation

Certificates have a restricted lifetime; a validity period is created for all certificates

Certificate revocation list (CRL) Communicates which certificates within a PKI

have been revoked

Page 23: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Trust Models

Techniques that establish how users validate certificates Direct trust Hierarchical trust Web of trust

Page 24: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Direct Trust Model

User trusts a key because the user knows where it came from

Page 25: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Hierarchical Trust Model

Based on a number of root certificates

Page 26: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Page 27: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Web of Trust

Combines concepts of direct trust and hierarchical trust

Adds the idea that trust is relative to each requester

Central theme: the more information available, the better the decision

Page 28: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key and Certificate Life Cycle Management

Setup or initialization Administration of issued keys and

certificates Certificate cancellation and key history

Page 29: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Setup and Initialization

Registration Key pair generation Certificate creation Certificate distribution Certificate dissemination Key backup

Page 30: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Registration

User requests certificate from CA CA verifies identity and credentials of user Certificate practice statement

Published document that explains CA structure to users

Certificate policy establishes: Who may serve as CA What types of certificates may be issued How they should be issued and managed

Page 31: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key Pair Generation

Involves creation of one or more key pairs using different algorithms

Dual or multiple keys are often utilized to perform different roles to support distinct services

Key pair can be restricted by policy to certain roles based on usage factors

Multiple key pairs usually require multiple certificates

Page 32: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificates

Distinguished name (DN) Unique identifier that is bound to a certificate

by a CA Uses a sequence of character(s) that is unique

to each user Appropriate certificate policies govern

creation and issuance of certificates

Page 33: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificate Dissemination Techniques

Securely make certificate information available to requester without too much difficulty Out-of-band distribution In-band distribution Publication Centralized repositories with controlled access

Page 34: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key Backup

Addresses lost keys Helps recover encrypted data Essential element of business continuity

and disaster recovery planning

Page 35: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key Escrow

Key administration process that utilizes a third party

Initialization phase involves: Certificate retrieval and validation Key recovery and key update

Page 36: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Cancellation Procedures

Certificate expiration Certificate revocation Key history Key archive

Page 37: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificate Expiration

Occurs when validity period of a certificate expires

Options upon expiration Certificate renewal Certificate update

Page 38: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificate Revocation

Implies cancellation of a certificate prior to its natural expiration

Revocation delay Delay associated with the revocation

requirement and subsequent notification

Page 39: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Certificate Revocation

How notification is accomplished Certificate revocation lists (CRLs) CRL distribution points Certificate revocation trees (CRTs) Redirect/Referral CRLs

Notification is unnecessary for: Short certificate lifetimes Single-entity approvals

Page 40: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key History

Deals with secure and reliable storage of expired keys for later retrieval to recover encrypted data

Applies more to encryption keys than signing keys

Page 41: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Key Archive

Service undertaken by a CA or third party to store keys and verification certificates

Meets audit requirements and handles resolution of disputes when used with other services (eg, time stamping and notarization)

Page 42: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Setting up an Enterprise PKI

Extremely complex task with enormous demands on financial, human, hardware, and software resources

Areas to explore Basic support Training Documentation issues

Page 43: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Areas to Explore in Detail When Setting up an Enterprise PKI

Support for standards, protocols, and third-party applications

Issues related to cross-certification, interoperability, and trust models

Multiple key pairs and key pair uses How to PKI-enable applications and client-

side software availability

continued…

Page 44: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Areas to Explore in Detail When Setting up an Enterprise PKI

Impact on end user for key backup, key or certificate update, and nonrepudiation services

Performance, scalability, and flexibility issues regarding distribution, retrieval, and revocation systems

Physical access control to facilities

Page 45: Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Chapter Summary

Ways that algorithms and certificate mechanisms are used to encrypt data flows

Concepts of cryptography Key and certificate life cycle management