SlideShare a Scribd company logo
Cryptography
www.ine.com
Introduction to Cryptography
Copyright © www.ine.com
»Changes plain text to cipher text through the
use of an algorithm
»Protects the confidentiality and integrity of
data
»What type of data need protecting?
• Data-at-rest
• Data-in-use
• Data-in-motion
Introduction to Cryptography
Copyright © www.ine.com
»Encryption and decryption
»What is a cipher?
• Cesar Cipher
• Numerical shift
• Generate the key; for example, 3
• “Cesar” becomes “Fhvdu”
• Can be broken with cryptanalysis
Introduction to Cryptography
Copyright © www.ine.com
»What is an encryption key?
• Determines the output of the cipher
• Length determines strength
• Key exchange is needed for asymmetric encryption
• Public keys
• Freely distributed
• Private keys
• Always a secret
Introduction to Cryptography
Copyright © www.ine.com
»Symmetric key cryptography
»Symmetric algorithms
• Stream cipher
• Block cipher
»Can be used for non-repudiation
• Message authentication code
• Verifies the integrity of the message
Introduction to Cryptography
Copyright © www.ine.com
»Asymmetric key cryptography
• Uses different keys – the public/private key pair
• Keys are mathematically related but otherwise have
no relation
• The longer the key the stronger the encryption
• What one key encrypts the other decrypts
• Public encrypts, private decrypts (confidentiality)
• Private encrypts, public decrypts (non-repudiation, integrity)
Introduction to Cryptography
Copyright © www.ine.com
»Uses of asymmetric key cryptography
• Digital signatures
• Signing the message
– Create a message digest of the message
– Sign the message digest with sender’s private key
– Protects integrity
– Provides authentication and non-repudiation
• Encrypt the message
Introduction to Cryptography
Copyright © www.ine.com
»Uses of asymmetric key cryptography
• Digital certificates
• Utilizes a public key infrastructure
• Provides identity information
• Resistant to forgery
• Verified by a third party
• Trusted third party (COMODO, Symantec, Verisign)
• Used in SSL/TLS sessions
Symmetric Cryptographic Algorithms
Copyright © www.ine.com
»DES/3DES
• Digital Encryption Standard
• 64-bit blocks
• 56-bit key size with 8 bits for parity
• Triple DES
• Feistel cipher
• 64-bit blocks
• 168-bit key
Symmetric Cryptographic Algorithms
Copyright © www.ine.com
»AES (Rijndael)
• Advanced Encryption Standard
• Adopted in 2002
• 128-, 192- and 256-bit
• Fast and uses minimal resources
• Multiple platform usage
• Wireless
• Data-in-transit
• Whole disk encryption
Symmetric Cryptographic Algorithms
Copyright © www.ine.com
»Rivest’s Cipher (RC)
• Stream and block ciphers
• Used in WEP, SSL, RDP
• RC4, RC5, and RC6 variants
»Schneier Ciphers
• Twofish
• Threefish
• Blowfish
Asymmetric Cryptographic Algorithms
Copyright © www.ine.com
»Diffie-Hellman-Merkle
• First practical shared key cryptosystem
• Utilizes modular arithmetic and factorization of large
prime numbers
• Vulnerable to specific attacks
• Man-in-the-middle (MITM)
• Mitigation through authentication
• Perfect Forward Secrecy (PFS)
Asymmetric Cryptographic Algorithms
Copyright © www.ine.com
»Rivest-Shamir-Adleman (RSA)
• Used in e-commerce
• Works with SSL/TLS
• Can be used for digital signatures as well as
cryptography
• Slower than symmetric cryptography
• Longer key lengths
• Utilizes integer factorization
• What one key encrypts the other decrypts
Asymmetric Cryptographic Algorithms
Copyright © www.ine.com
»Rivest-Shamir-Adleman (RSA)
• Used in security tokens
• Trusted platform modules (TPM)
• Cryptoprocessor that integrates encryption keys
• Hardware security modules (HSM)
• External key management module
• Vulnerable to specific attacks
• Timing attacks
• Man-in-the-middle (MITM)
• Mitigation through padding
Asymmetric Cryptographic Algorithms
Copyright © www.ine.com
»Eliptic Curve Cryptography (ECC)
• Based on the structure of an elliptic curve
• Uses smaller keys
• Faster
• Used in mobile devices, smart cards, wireless
• Can be used with other algorithms
• Diffie-Hellman (ECDH)
• Digital Signature Algorithm (ECDSA)
Asymmetric Cryptographic Algorithms
Copyright © www.ine.com
»Elliptic Curve Cryptography (ECC)
• Vulnerabilities
• Side-channel attacks
– Leaked information from physical implementations
• Algorithm backdoors
• Quantum cryptanalysis
– Theoretical attack based on quantum physics
Other Cryptographic Algorithms
Copyright © www.ine.com
»One-Time Pad or Vernam Cipher
• Stream cipher
• Key is the same length as the plaintext
• The keystream is generated at random
• Keystream combined with the plaintext using a
bitwise XOR operation
• The only cryptosystem with theoretically perfect
secrecy
• Provides no information to the analyst
Other Cryptographic Algorithms
Copyright © www.ine.com
»One-Time Pad or Vernam Cipher
• Problems with the one-time pad
• Requires perfect randomness
• Cryptosystems will only be able to implement pseudo-
randomness
Other Cryptographic Algorithms
Copyright © www.ine.com
»Pretty Good Privacy (PGP)
• Uses
• Signing, encrypting, and decrypting emails
• Whole disk encryption
• File and instant message encryption
• Symmetric session key (PSK)
• Can use asymmetric encryption (RSA) for digital signatures
and encryption
• Supports openPGP and S/MIME
• Security is based on key size
Steganography – Hiding in Plain Sight
Copyright © www.ine.com
»Security through obscurity
»Modify the least significant bit
• Image
• Audio
• Video
»LACK
»HICCUPS
Hashing
Copyright © www.ine.com
»Generated through the use of a one-way
function
• Mathematical operation that converts a variable-sized
block of data into a fixed-length block of data
• A hash of a file, email, or other message can be generated
at the source
• This hash value is made public and can be compared by
anyone who views the file to ensure that no alterations
have been made
• Significant change in the hash value will result upon the
slightest change in the message
Hashing
Copyright © www.ine.com
»Types of cryptographic hash functions
• Message Digest 5
• Created by Ron Rivest
• 32-character output
• More susceptible to collisions
• Secure Hashing Algorithm
• Version 1 – 160-bit hash
• Version 2 – 256- to 512-bit block size
Hashing
Copyright © www.ine.com
»Types of cryptographic hash functions
• RIPEMD
• RACE Integrity Primitives Evaluation Message Digest
• 128-bit
• 160-bit
• HMAC
• Hash-based Message Authentication Code
• Uses MD5 or SHA for message authentication
Hashing
Copyright © www.ine.com
»Microsoft domain password hashing algorithms
• LANMAN
• Used before Windows NT
• Based on DES
• Maximum of 14 characters
• NTLM
• Based on RC4
• NTLMv2
• Based on MD5
Hashing
Copyright © www.ine.com
»Vulnerabilities
• Happy Birthday
• Collision
»Defenses
• Key stretching
• Salting
• Nonce
• Complexity and length
Public Key Infrastructure
Copyright © www.ine.com
»Functions of the PKI
• Create, distribute, store, and revoke digital certificates
• System of users, hardware, encryption, policies, and
procedures
• Secure websites over SSL/TLS
• Email
• Securing remote connections
• Computers
• Networks
Public Key Infrastructure
Copyright © www.ine.com
»Not the same as asymmetric cryptography
»Components
• Users
• Computers
• Servers
• Encryption
• Policies
• Procedures
Public Key Infrastructure
Copyright © www.ine.com
»Components of the PKI
• Digital certificates
• Binds the user key to an identity for verification
• X509 Standard
• What does the X509 include?
• Certificate owner and their public key
• Certificate authorities
– Name
– Digital signature
– Serial number, issue date, expiration date
Public Key Infrastructure
Copyright © www.ine.com
»Components of the PKI
• What is the certificate authority?
• Issuing authority (trusted third party)
• Verifies the identity of the certificate recipient
• Maps the public key of the party to the identity
• Types of certificates
• One-to-one mapping
• One-to-many mapping
Public Key Infrastructure
Copyright © www.ine.com
»Components of the PKI
• Registration authority
• Verifies the request for the digital certificate
• Gives the “OK” for the CA to issue the certificate
• Certificate revocation list
• Updated every 24 hours
• Used to verify the validity of a digital certificate
• Online certificate status protocol (OCSP)
Public Key Infrastructure
Copyright © www.ine.com
»Components of the PKI
• Key escrow
• Used when data loss in unacceptable
• Key recovery agent
• Allows for the recovery of corrupted or lost keys
• Single and dual-sided certificates
• Best for smaller environments with limited sessions
Public Key Infrastructure
Copyright © www.ine.com
»Web of trust
• Decentralized model of trust
• Peer to peer
• No root certificate authority
• Certificates are self signed
• Users decide which certificates to trust
• Used by PGP
Secure Connection Types
Copyright © www.ine.com
» Email/communications
• PGP
• S/MIME
• IPSec
• SSH
» Website logins and e-commerce
• SSL/TLS
» Direct connections to other workstations
»Virtual connections to remote networks
• VPNs (PPTP/L2TP)
Secure Connection Protocols
Copyright © www.ine.com
»S/MIME
• Secure/Multi-purpose Internet Mail Extensions
• Developed by RSA
• Authentication/integrity/non-repudiation
• Uses unique session keys
• Relies on PKI
• Relies on certificate authorities
Secure Connection Protocols
Copyright © www.ine.com
»SSH
• Creates an encrypted channel between two
workstations or network devices
• Designed as a replacement for telnet
• Utilizes asymmetric key cryptography
• SSH Daemon and SSH Client
• Runs on port 22
Secure Connection Protocols
Copyright © www.ine.com
»SSL/TLS
• Uses
• IM
• Email
• Web browsing
• VoIP
• Relies on PKI
• Two keys required
• Public and session
Secure Connection Protocols
Copyright © www.ine.com
»Virtual Private Networks (VPNs)
• Enables secure remote connections
»PPTP
• Point-to-point tunneling protocol
• Encapsulates PPP packets
• Uses port 1723
Secure Connection Protocols
Copyright © www.ine.com
»Virtual Private Networks (VPNs)
• L2TP
• Layer 2 tunneling protocol
• No inherent security
• Uses port 1701
• Uses PKI
Secure Connection Protocols
Copyright © www.ine.com
»IPSec
• Native to IPv6
• Security association
• Sub-protocols
• Internet Key Exchange (IKE)
• Authentication Header (AH)
• Encapsulating security payload (ESP)
• IP Payload Compression Protocol (IPComp)
Copyright © www.ine.com All rights reserved.
Questions?

More Related Content

PPT
Cryptography
suresh0506
 
PPTX
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
PPT
Cryptography
Pragun Shah
 
PPTX
Basic cryptography
Perfect Training Center
 
Cryptography
suresh0506
 
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
Cryptography
Pragun Shah
 
Basic cryptography
Perfect Training Center
 

Similar to CompTIASecPLUS-Part6 - UnlimitedEdited.pptx (20)

PPTX
Cryptography
Muhammad Shoaib Saleem
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
Basic Cryptography.pdf
Setiya Nugroho
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
Ch 12: Cryptography
Sam Bowne
 
PDF
Pki 201 Key Management
NCC Group
 
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
PPTX
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
PPTX
501 ch 10 cryptography
Toyeeb Onimole
 
PDF
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
mishrarajimsec
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PPTX
Slidecast - Workshop
Samant Khajuria
 
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PDF
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
PDF
CNIT 123 12: Cryptography
Sam Bowne
 
DOCX
cryptography in engineering related as software
SarabjotSingh72
 
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
PPTX
Encryption algorithms
trilokchandra prakash
 
PPT
CS553 ST7 Ch21 Network Security chapter 21
KhaledMohammadSoradi
 
CNIT 141: 1. Encryption
Sam Bowne
 
CNIT 141: 1. Encryption
Sam Bowne
 
Basic Cryptography.pdf
Setiya Nugroho
 
CNIT 141: 1. Encryption
Sam Bowne
 
Ch 12: Cryptography
Sam Bowne
 
Pki 201 Key Management
NCC Group
 
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
501 ch 10 cryptography
Toyeeb Onimole
 
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
mishrarajimsec
 
CNIT 141: 1. Encryption
Sam Bowne
 
Slidecast - Workshop
Samant Khajuria
 
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
CNIT 123 12: Cryptography
Sam Bowne
 
cryptography in engineering related as software
SarabjotSingh72
 
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Encryption algorithms
trilokchandra prakash
 
CS553 ST7 Ch21 Network Security chapter 21
KhaledMohammadSoradi
 
Ad

Recently uploaded (20)

PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Doc9.....................................
SofiaCollazos
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Software Development Methodologies in 2025
KodekX
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Ad

CompTIASecPLUS-Part6 - UnlimitedEdited.pptx

  • 2. Introduction to Cryptography Copyright © www.ine.com »Changes plain text to cipher text through the use of an algorithm »Protects the confidentiality and integrity of data »What type of data need protecting? • Data-at-rest • Data-in-use • Data-in-motion
  • 3. Introduction to Cryptography Copyright © www.ine.com »Encryption and decryption »What is a cipher? • Cesar Cipher • Numerical shift • Generate the key; for example, 3 • “Cesar” becomes “Fhvdu” • Can be broken with cryptanalysis
  • 4. Introduction to Cryptography Copyright © www.ine.com »What is an encryption key? • Determines the output of the cipher • Length determines strength • Key exchange is needed for asymmetric encryption • Public keys • Freely distributed • Private keys • Always a secret
  • 5. Introduction to Cryptography Copyright © www.ine.com »Symmetric key cryptography »Symmetric algorithms • Stream cipher • Block cipher »Can be used for non-repudiation • Message authentication code • Verifies the integrity of the message
  • 6. Introduction to Cryptography Copyright © www.ine.com »Asymmetric key cryptography • Uses different keys – the public/private key pair • Keys are mathematically related but otherwise have no relation • The longer the key the stronger the encryption • What one key encrypts the other decrypts • Public encrypts, private decrypts (confidentiality) • Private encrypts, public decrypts (non-repudiation, integrity)
  • 7. Introduction to Cryptography Copyright © www.ine.com »Uses of asymmetric key cryptography • Digital signatures • Signing the message – Create a message digest of the message – Sign the message digest with sender’s private key – Protects integrity – Provides authentication and non-repudiation • Encrypt the message
  • 8. Introduction to Cryptography Copyright © www.ine.com »Uses of asymmetric key cryptography • Digital certificates • Utilizes a public key infrastructure • Provides identity information • Resistant to forgery • Verified by a third party • Trusted third party (COMODO, Symantec, Verisign) • Used in SSL/TLS sessions
  • 9. Symmetric Cryptographic Algorithms Copyright © www.ine.com »DES/3DES • Digital Encryption Standard • 64-bit blocks • 56-bit key size with 8 bits for parity • Triple DES • Feistel cipher • 64-bit blocks • 168-bit key
  • 10. Symmetric Cryptographic Algorithms Copyright © www.ine.com »AES (Rijndael) • Advanced Encryption Standard • Adopted in 2002 • 128-, 192- and 256-bit • Fast and uses minimal resources • Multiple platform usage • Wireless • Data-in-transit • Whole disk encryption
  • 11. Symmetric Cryptographic Algorithms Copyright © www.ine.com »Rivest’s Cipher (RC) • Stream and block ciphers • Used in WEP, SSL, RDP • RC4, RC5, and RC6 variants »Schneier Ciphers • Twofish • Threefish • Blowfish
  • 12. Asymmetric Cryptographic Algorithms Copyright © www.ine.com »Diffie-Hellman-Merkle • First practical shared key cryptosystem • Utilizes modular arithmetic and factorization of large prime numbers • Vulnerable to specific attacks • Man-in-the-middle (MITM) • Mitigation through authentication • Perfect Forward Secrecy (PFS)
  • 13. Asymmetric Cryptographic Algorithms Copyright © www.ine.com »Rivest-Shamir-Adleman (RSA) • Used in e-commerce • Works with SSL/TLS • Can be used for digital signatures as well as cryptography • Slower than symmetric cryptography • Longer key lengths • Utilizes integer factorization • What one key encrypts the other decrypts
  • 14. Asymmetric Cryptographic Algorithms Copyright © www.ine.com »Rivest-Shamir-Adleman (RSA) • Used in security tokens • Trusted platform modules (TPM) • Cryptoprocessor that integrates encryption keys • Hardware security modules (HSM) • External key management module • Vulnerable to specific attacks • Timing attacks • Man-in-the-middle (MITM) • Mitigation through padding
  • 15. Asymmetric Cryptographic Algorithms Copyright © www.ine.com »Eliptic Curve Cryptography (ECC) • Based on the structure of an elliptic curve • Uses smaller keys • Faster • Used in mobile devices, smart cards, wireless • Can be used with other algorithms • Diffie-Hellman (ECDH) • Digital Signature Algorithm (ECDSA)
  • 16. Asymmetric Cryptographic Algorithms Copyright © www.ine.com »Elliptic Curve Cryptography (ECC) • Vulnerabilities • Side-channel attacks – Leaked information from physical implementations • Algorithm backdoors • Quantum cryptanalysis – Theoretical attack based on quantum physics
  • 17. Other Cryptographic Algorithms Copyright © www.ine.com »One-Time Pad or Vernam Cipher • Stream cipher • Key is the same length as the plaintext • The keystream is generated at random • Keystream combined with the plaintext using a bitwise XOR operation • The only cryptosystem with theoretically perfect secrecy • Provides no information to the analyst
  • 18. Other Cryptographic Algorithms Copyright © www.ine.com »One-Time Pad or Vernam Cipher • Problems with the one-time pad • Requires perfect randomness • Cryptosystems will only be able to implement pseudo- randomness
  • 19. Other Cryptographic Algorithms Copyright © www.ine.com »Pretty Good Privacy (PGP) • Uses • Signing, encrypting, and decrypting emails • Whole disk encryption • File and instant message encryption • Symmetric session key (PSK) • Can use asymmetric encryption (RSA) for digital signatures and encryption • Supports openPGP and S/MIME • Security is based on key size
  • 20. Steganography – Hiding in Plain Sight Copyright © www.ine.com »Security through obscurity »Modify the least significant bit • Image • Audio • Video »LACK »HICCUPS
  • 21. Hashing Copyright © www.ine.com »Generated through the use of a one-way function • Mathematical operation that converts a variable-sized block of data into a fixed-length block of data • A hash of a file, email, or other message can be generated at the source • This hash value is made public and can be compared by anyone who views the file to ensure that no alterations have been made • Significant change in the hash value will result upon the slightest change in the message
  • 22. Hashing Copyright © www.ine.com »Types of cryptographic hash functions • Message Digest 5 • Created by Ron Rivest • 32-character output • More susceptible to collisions • Secure Hashing Algorithm • Version 1 – 160-bit hash • Version 2 – 256- to 512-bit block size
  • 23. Hashing Copyright © www.ine.com »Types of cryptographic hash functions • RIPEMD • RACE Integrity Primitives Evaluation Message Digest • 128-bit • 160-bit • HMAC • Hash-based Message Authentication Code • Uses MD5 or SHA for message authentication
  • 24. Hashing Copyright © www.ine.com »Microsoft domain password hashing algorithms • LANMAN • Used before Windows NT • Based on DES • Maximum of 14 characters • NTLM • Based on RC4 • NTLMv2 • Based on MD5
  • 25. Hashing Copyright © www.ine.com »Vulnerabilities • Happy Birthday • Collision »Defenses • Key stretching • Salting • Nonce • Complexity and length
  • 26. Public Key Infrastructure Copyright © www.ine.com »Functions of the PKI • Create, distribute, store, and revoke digital certificates • System of users, hardware, encryption, policies, and procedures • Secure websites over SSL/TLS • Email • Securing remote connections • Computers • Networks
  • 27. Public Key Infrastructure Copyright © www.ine.com »Not the same as asymmetric cryptography »Components • Users • Computers • Servers • Encryption • Policies • Procedures
  • 28. Public Key Infrastructure Copyright © www.ine.com »Components of the PKI • Digital certificates • Binds the user key to an identity for verification • X509 Standard • What does the X509 include? • Certificate owner and their public key • Certificate authorities – Name – Digital signature – Serial number, issue date, expiration date
  • 29. Public Key Infrastructure Copyright © www.ine.com »Components of the PKI • What is the certificate authority? • Issuing authority (trusted third party) • Verifies the identity of the certificate recipient • Maps the public key of the party to the identity • Types of certificates • One-to-one mapping • One-to-many mapping
  • 30. Public Key Infrastructure Copyright © www.ine.com »Components of the PKI • Registration authority • Verifies the request for the digital certificate • Gives the “OK” for the CA to issue the certificate • Certificate revocation list • Updated every 24 hours • Used to verify the validity of a digital certificate • Online certificate status protocol (OCSP)
  • 31. Public Key Infrastructure Copyright © www.ine.com »Components of the PKI • Key escrow • Used when data loss in unacceptable • Key recovery agent • Allows for the recovery of corrupted or lost keys • Single and dual-sided certificates • Best for smaller environments with limited sessions
  • 32. Public Key Infrastructure Copyright © www.ine.com »Web of trust • Decentralized model of trust • Peer to peer • No root certificate authority • Certificates are self signed • Users decide which certificates to trust • Used by PGP
  • 33. Secure Connection Types Copyright © www.ine.com » Email/communications • PGP • S/MIME • IPSec • SSH » Website logins and e-commerce • SSL/TLS » Direct connections to other workstations »Virtual connections to remote networks • VPNs (PPTP/L2TP)
  • 34. Secure Connection Protocols Copyright © www.ine.com »S/MIME • Secure/Multi-purpose Internet Mail Extensions • Developed by RSA • Authentication/integrity/non-repudiation • Uses unique session keys • Relies on PKI • Relies on certificate authorities
  • 35. Secure Connection Protocols Copyright © www.ine.com »SSH • Creates an encrypted channel between two workstations or network devices • Designed as a replacement for telnet • Utilizes asymmetric key cryptography • SSH Daemon and SSH Client • Runs on port 22
  • 36. Secure Connection Protocols Copyright © www.ine.com »SSL/TLS • Uses • IM • Email • Web browsing • VoIP • Relies on PKI • Two keys required • Public and session
  • 37. Secure Connection Protocols Copyright © www.ine.com »Virtual Private Networks (VPNs) • Enables secure remote connections »PPTP • Point-to-point tunneling protocol • Encapsulates PPP packets • Uses port 1723
  • 38. Secure Connection Protocols Copyright © www.ine.com »Virtual Private Networks (VPNs) • L2TP • Layer 2 tunneling protocol • No inherent security • Uses port 1701 • Uses PKI
  • 39. Secure Connection Protocols Copyright © www.ine.com »IPSec • Native to IPv6 • Security association • Sub-protocols • Internet Key Exchange (IKE) • Authentication Header (AH) • Encapsulating security payload (ESP) • IP Payload Compression Protocol (IPComp)
  • 40. Copyright © www.ine.com All rights reserved. Questions?