Cryptographic Concepts Flashcards
Digital Signatures
Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity
Digital Signatures
Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity
Digital Signatures
Encrypted hash of sender private key
DSS
Digital Signature Standard
SHA 2or 3 message softest in conjunction with 3 encryption algorithms; DSA, RSA, ECDSA
Salting
Random data used for extra input to a hash. Reduced effectiveness for Rainbow Tables
ECC
Elliptic Curve Cryptography
Symmetric
Shared secret key,
Poor scalability, easy distribution and non repudiation
Asymmetric
Public-Private keys
Scalability, easy distribution
Asymmetric Key Use with data
Data:
To encrypt use recipients public key
Decrypt use your own private key
Signature:
Use your private key
Recipient uses public key
Symmetric algorithm Use
For bulk encryption eg AES256
Asymmetric Algorithm Use
Distribution of symmetric keys
Digital signatures, Non repudiation and key agreement
Eg. RSA, DSS, ECC
Hash Use
Digital signatures
Pseudo-Random number generation
Integrity services
Post Quantum Cryptography
New kinds of approaches using todays computers but will be resistant to quantum computers when they arrive
Quantum Key Distribution
Transferring with photons of light and can’t be copied or intercepted
ECB
Electronic Codebook Mode
Block Cipher
Least secure- 64bit blocks with chosen key block repetitions will use same encrypted block
CBC
Cipher Block Chaining
Each block is XORed with the block of cipher immediately preceding
CTR
Uses an incrementing counter and errors do not propagate
Blockchain
Distributed public ledger
Does not use intermediaries
Data chained with a block holding the hash for itself and that of the preceding
To create new, computer solves a puzzle and sends solution to the others participating in the chain
Lightweight Cryptography
ECC (asymmetric) for low power devices
AES256 (symmetric) for military
PFS
Perfect Forward Secrecy
Don’t use server’s private RSA key
ECDHE to exchange keys and move on
Cannot use the private key to decrypt
More computer power
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Used for perfect forward secrecy
RSA
Rivest, Shamir & Adleman
One of oldest public (asymmetric) key cryptographic algorithms widely used for email and web
XOR
Exclusive Or
2 bits identical = 0
2 bits different = 1
SRTP
Secure Real Time Transfer Protocol
For voice and video
Uses AES, HMAC-SHA1
NTPsec
Secure Network Time Protocol
S/MIME
Secure Multipurpose Internet Mail Connections
Public key encryption and signing of content
PKI organisation required
SSL/TLS
Secure Sockets Layer/ Transports Layer Security
Uses HTTPS, with private key on server to transfer symmetric session key.
IPsec
Layer 3 authentication and encryption
AH (Authentication Header)
ESP (encapsulation security payload)
FTPS/SFTP
FTPS uses SSL
SFTP uses SSH (better) and gives file , directory functionality, interrupt her
SASL
Simple Authentication and Security Layer
Provides authentication with LDAP, Kerberos, Certificates
How to secure DHCP?
In AD DHCP servers must be authorised
Switches can be configured with trusted interfaces
Distribution only allowed from trusted interfaces
Cisco call it DHCP Snooping