Asymmetric (Public) key cryptosystems
RSA
Diffie-Hellman
ElGamal
Eliptic Curve (ECC)
5 Requirements for hash functions
Common Hash Algorithms
SHA-1 - insecure and deprecated; 160-bit hash
SHA-2:
- SHA-256 (256 bit hash)
- SHA-224 (224 bit hash)
- SHA-512 (512 bit hash)
- SHA-384 (384 bit hash)
SHA-3: same level of security but slower than SHA-2
MD5 - 128 bit hash
RIPEMD:
- RIPEMD-160 - only secure variant; 160 bit hash
HAVAL: similar to MD5 but variable hash lengths (128, 160, 192, 224, 256 bits)
Digital signatures
2 goals: non-repudiation and authenticity
HMAC hybrid - use shared key encryption instead of public key; no non-repudiation
Digital Signature Standard (DSS)
Mandated FIPS for gov’t use
SHA-3 for hash (message digest)
For encryption:
1. RSA
2. Eliptic curve DSA (ECDSA)
3. Edward curve DSA (EdDSA)
Dig Certificates - X.509
Certificate Authorities (CA)
Certificate life-cycle
Certificate pinning - cert (public key) associated with site for extended time
Certificate stapling - OCSP server staples OSCP response with cert and sends to website server; reduce repeated requests to OCSP; good for 24 hours usually
Certificate formats
Common:
- DER - binary (.der, .crt, .cer)
- PEM - ascii (.pem, .crt)
Windows:
- PFX - binary (.pfx, .p12)
- P7B - ascii
HSM (hardware security module)
Email security
PGP - includes digital signature with email
S/MIME - use RSA and X.509 certs
TLS operation
(TLS 1.2 or 1.3)
Enumerates the following:
1. Key exchange algorithm (not TLS 1.3)
2. Authentication method (public key algorithm)
3. Bulk encryption method (symmetric key algorithm)
4. Hash algorithm for MD’s
Tor (The Onion Router)
[Dark Web]
Network traffic routed through different relay nodes, each with layer of encryption, a.k.a. Perfect Forward Secrecy
Network Encryption
Link encryption - lower layers of OSI (all including routing data encrypted)
End-to-end encryption - higher layers of OSI (routing data not encrypted)
SSH2
Better than SSH, includes DH key exchange, multiple sessions in single SSH connection
IPSEC
AH (Authentication Header) - authentication
ESP (Encapsulated Security Payload) - payload encryption with limited authen
Transport mode - end-to-end encryption; only data payload is encrypted
Tunnel mode - entire packet (data + header) encrypted, i.e. link encryption
Uses SA (security associations) channels; simplex
Blockchain
Distributed across many different systems
Protected from being tampered with
Cryptographic attacks