Cryptography 🤝 Flashcards
Which security protocol is associated with the names Diffie and Hellman?
The Diffie Hellman key exchange.
Two parties securely exchange a common secret over an insecure channel.
Services of Cryptosystems
Cryptosystems/ Cryptographic protocols can provide;
Confidentiality
Integrity
Authentication; verify identy.
Authorization ->provide key and access to data resource.
Nonrepudiation; sender cannot deny having sent message/request.
Cryptography
Cryptography is the science of secret writing with the goal of hiding the meaning of a message.
Cryptanalysis is the science of breaking cryptography. Cryptology covers both cryptography and cryptanalysis.
What four security services can cryptography provide?
Confidentiality:
Makes data unreadable to entities who do not have the
appropriate cryptographic keys, even if they have the data.
Data Integrity:
Entities with the appropriate cryptographic keys can verify that
data is correct and has not been altered, either deliberately or
accidentally.
Authentication:
Entities who communicate can be assured that the other
user/entity or the sender of a message is what it claims to be.
Digital Signature and PKI (Public-Key Infrastructure):
Strong proof of data origin which can be verified by 3rd parties.
Scalable (to the whole Internet) distribution of cryptographic keys.
Key Management
The strength of cryptographic security depends on:
- The size of the keys
- The robustness of cryptographic algorithms/protocols
- The protection and management afforded to the keys
Key management provides the foundation for the secure generation, storage, distribution, and destruction of keys. Key management is essential for cryptographic security. Poor key management may easily lead to compromise of systems where the security is based on cryptography.
Key Usage
A single key should be used for only one purpose e.g., encryption, authentication, key wrapping, random number generation, or digital signature generation. Using the same key for two different purposes may weaken the security of one or both purposes. Limiting the use of a key limits the damage that could be done if the key is compromised. Some uses of keys interfere with each other, e.g. an asymmetric key pair should only be used for either encryption or digital signatures, not both.
AES
Advanced Encryption Standard.
Symmetric- key block cipher algorithm.
Has three fixed 128 bit block ciphers with cryptographic key sizes of 128, 192, 256.
unlimited key size,
Blocksize maximum is 256 bits.
El Gamal
El Gamal is a public key algorithm that can be used for digital signatures, encryption and key exchange.
One-Way Functions
A one-way function is a mathematical function that is easier to compute in one direction, than in the opposite direction.
Analogy; drop a glass to the floor. The dropping is easy, putting it back together is more difficult. (CISSP, s.390)
This concept is similar to how one-way functions are used in cryptography.
RSA
The most popular public key algorithm, when it comes to asymmetric algorithms. RSA is a world wide de-facto, and can be used for digital signatures, key exchange, and encryption.
It provides authentication as well as key encryption.
It was developed in 1978 at MIT, by Ron Rivest, Adi Shamir, Leonard Adleman.
IDEA
International Data Encryption Algorithm (IDEA) is a block cipher and operates on 64-bit blocks of data.
The 64-bit data block is divided into 16 smaller blocks, and each has eight rounds of mathematical functions performed on it.
The key 128 bits long. (CISSP, s.384)
Blowfish
Blowfish is block cipher that works on 64-bit blocks of data. The key length can be anywhere from 32 bits up to 448 bits, and the data blocks go through 16 rounds of cryptographic functions.(CISSP, s.384)
RC4
RC4 is one of the most commonly implemented stream ciphers. It has variable key size, and is implemented in the Secure Sockets Layers (SSL) protocol.
It is simple, fast and efficient, but vulnerable to modification attacks. Was leaked online and the stolen algorithm is sometimes implemented and referred to as ArcFour(ARC4) because of trademarking. (CISSP, s.384)
SSH
Secure Shell (SSH) is a cryptographic protocol and interface for executing network services. It uses the algorithms; AES, IDEA & Blowfish for encryption.
PKI
Public Key Infrastructure (PKI) A framework for key distribution in open networks. ... ... ...