MODULE 21 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards
Integrity and Authenticity Securing Communications Organizations must provide support to secure the data as it travels across links.
This may include internal traffic, but it is even more important to protect the data that travels outside of the organization to branch sites, telecommuter sites, and partner sites.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Integrity :
Guarantees that the message was not altered. Any changes to data in transit will be detected.
Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Origin Authentication :
Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Confidentiality - :
Guarantees that only authorized users can read the message.
If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Non-Repudiation -
Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Non-repudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Cryptography can be used almost anywhere that there is data communication. In fact, the trend is toward all communication being encrypted.
Cryptographic Hash Functions
Hashes are used to verify and ensure data integrity.
Hashing is based on a one-way mathematical function that is relatively easy to compute, but significantly harder to reverse.
Grinding coffee is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the tiny pieces back together to rebuild the original beans.
The cryptographic hashing function can also be used to verify authentication.
https://snipboard.io/I3FfsM.jpg
Cryptographic Hash Functions Grinding coffee is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the tiny pieces back together to rebuild the original beans.
The cryptographic hashing function can also be used to verify authentication.
https://snipboard.io/I3FfsM.jpg
As shown in the figure,
https://snipboard.io/I3FfsM.jpg a hash function takes a variable block of binary data, called the message, and produces a fixed-length, condensed representation, called the hash.
The resulting hash is also sometimes called the message digest, digest, or digital fingerprint.
Cryptographic Hash Functions
As shown in the figure,
https://snipboard.io/I3FfsM.jpg a hash function takes a variable block of binary data, called the message, and produces a fixed-length, condensed representation, called the hash.
The resulting hash is also sometimes called the message digest, digest, or digital fingerprint.
With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output.
Every time the data is changed or altered, the hash value also changes.
Because of this, cryptographic hash values are often called digital fingerprints.
They can be used to detect duplicate data files, file version changes, and similar applications.
These values are used to guard against an accidental or intentional change to the data, or accidental data corruption.
Cryptographic Hash Functions
With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output.
Every time the data is changed or altered, the hash value also changes.
Because of this, cryptographic hash values are often called digital fingerprints.
They can be used to detect duplicate data files, file version changes, and similar applications. These values are used to guard against an accidental or intentional change to the data, or accidental data corruption.
The cryptographic hash function is applied in many different situations for entity authentication, data integrity, and data authenticity purposes.
Cryptographic Hash Operation Mathematically, the equation h= H(x) is used to explain how a hash algorithm operates.
As shown in the figure, a hash function H takes an input x and returns a fixed-size string hash value h.
https://snipboard.io/tYNFW4.jpg
The example in the figure
https://snipboard.io/tYNFW4.jpg summarizes the mathematical process.
A cryptographic hash function should have the following properties:
The input can be any length. The output has a fixed length. H(x) is relatively easy to compute for any given x.
H(x) is one way and not reversible.
H(x) is collision free, meaning that two different input values will result in different hash values.
If a hash function is hard to invert, it is considered a one-way hash.
Hard to invert means that given a hash value of h, it is computationally infeasible to find an input for x such that h=H(x).
MD5 and SHA Hash functions are used to ensure the integrity of a message.
They ensure data has not changed accidentally or intentionally. In the figure, the sender is sending a $100 money transfer to Alex.
The sender wants to ensure that the message is not accidentally altered on its way to the receiver.
Deliberate changes that are made by a threat actor are still possible.
https://snipboard.io/Mkg3cB.jpg
MD5 and SHA Hash functions are used to ensure the integrity of a message.
They ensure data has not changed accidentally or intentionally. In the figure, the sender is sending a $100 money transfer to Alex.
The sender wants to ensure that the message is not accidentally altered on its way to the receiver.
Deliberate changes that are made by a threat actor are still possible.
https://snipboard.io/Mkg3cB.jpg
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
MD5 with 128-bit digest :
Developed by Ron Rivest and used in a variety of internet applications, MD5 is a one-way function that produces a 128-bit hashed message.
MD5 is considered to be a legacy algorithm and should be avoided and used only when no better alternatives are available.
It is recommended that SHA-2 or SHA-3 be used instead.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-1 :
Developed by the U.S. National Security Agency (NSA) in 1995.
It is very similar to the MD5 hash functions. Several versions exist.
SHA-1 creates a 160-bit hashed message and is slightly slower than MD5.
SHA-1 has known flaws and is a legacy algorithm.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-2 :
Developed by the NSA.
It includes SHA-224 (224 bit),
SHA-256 (256 bit),
SHA-384 (384 bit), and
SHA-512 (512 bit). If you are using SHA-2, then the SHA-256, SHA-384,
and SHA-512 algorithms should be used whenever possible.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-3 :
SHA-3 is the newest hashing algorithm and was introduced by NIST as an alternative and eventual replacement for the SHA-2 family of hashing algorithms.
SHA-3 includes SHA3-224 (224 bit),
SHA3-256 (256 bit),
SHA3-384 (384 bit),
and SHA3-512 (512 bit).
The SHA-3 family are next-generation algorithms and should be used whenever possible.
SHA-3 :
SHA-3 is the newest hashing algorithm and was introduced by NIST as an alternative and eventual replacement for the SHA-2 family of hashing algorithms.
SHA-3 includes SHA3-224 (224 bit),
SHA3-256 (256 bit),
SHA3-384 (384 bit), and
SHA3-512 (512 bit).
The SHA-3 family are next-generation algorithms and should be used whenever possible.
While hashing can be used to detect accidental changes, it cannot be used to guard against deliberate changes that are made by a threat actor.
There is no unique identifying information from the sender in the hashing procedure.
This means that anyone can compute a hash for any data, as long as they have the correct hash function.
While hashing can be used to detect accidental changes, it cannot be used to guard against deliberate changes that are made by a threat actor.
There is no unique identifying information from the sender in the hashing procedure.
This means that anyone can compute a hash for any data, as long as they have the correct hash function.
For example, when the message traverses the network, a potential attacker could intercept the message, change it, recalculate the hash, and append it to the message.
The receiving device will only validate against whatever hash is appended.
Therefore, hashing is vulnerable to man-in-the-middle attacks and does not provide security to transmitted data.
To provide integrity and origin authentication, something more is required.
Origin Authentication To add origin authentication and integrity assurance, use a keyed-hash message authentication code (HMAC).
HMAC uses an additional secret key as input to the hash function.
Note: Other Message Authentication Code (MAC) methods are also used.
However, HMAC is used in many systems including SSL, IPsec, and SSH.
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
HMAC HASHING ALGORITHM :
As shown in the figure, an HMAC is calculated using any cryptographic algorithm that combines a cryptographic hash function with a secret key. Hash functions are the basis of the protection mechanism of HMACs.
Only the sender and the receiver know the secret key, and the output of the hash function now depends on the input data and the secret key.
Only parties who have access to that secret key can compute the digest of an HMAC function.
This defeats man-in-the-middle attacks and provides authentication of the data origin.
If two parties share a secret key and use HMAC functions for authentication, a properly constructed HMAC digest of a message that a party has received indicates that the other party was the originator of the message.
This is because the other party possesses the secret key.
https://snipboard.io/EMQSXa.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
CREATING THE HMAC VALUE:
As shown in the figure, the sending device inputs data (such as Terry Smith’s pay of $100 and the secret key) into the hashing algorithm and calculates the fixed-length HMAC digest.
This authenticated digest is then attached to the message and sent to the receiver.
https://snipboard.io/lPLZDO.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
VERIFYING THE HMAC VALUE :
In the figure, the receiving device removes the digest from the message and uses the plaintext message with its secret key as input into the same hashing function.
If the digest that is calculated by the receiving device is equal to the digest that was sent, the message has not been altered.
Additionally, the origin of the message is authenticated because only the sender possesses a copy of the shared secret key.
The HMAC function has ensured the authenticity of the message.
https://snipboard.io/1yULY4.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
CISCO ROUTER HMAC EXAMPLE :
The figure shows how HMACs are used by Cisco routers that are configured to use Open Shortest Path First (OSPF) routing authentication.
R1 is sending a link state update (LSU) regarding a route to network 10.2.0.0/16: R1 calculates the hash value using the LSU message and the secret key.
The resulting hash value is sent with the LSU to R2. R2 calculates the hash value using the LSU and its secret key.
R2 accepts the update if the hash values match. If they do not match, R2 discards the update.
https://snipboard.io/Loy6am.jpg
Confidentiality Data Confidentiality
There are two classes of encryption used to provide data confidentiality;
asymmetric and symmetric.
These two classes differ in how they use keys.
Symmetric encryption algorithms such as Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are based on the premise that each communicating party knows the pre-shared key.
Data confidentiality can also be ensured using asymmetric algorithms, including Rivest, Shamir, and Adleman (RSA) and the public key infrastructure (PKI).
Symmetric encryption algorithms such as Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are based on the premise that each communicating party knows the pre-shared key.
Data confidentiality can also be ensured using asymmetric algorithms, including Rivest, Shamir, and Adleman (RSA) and the public key infrastructure (PKI).
Note:
DES is a legacy algorithm and should not be used. 3DES should be avoided if possible. The figure highlights some differences between symmetric and asymmetric encryption.
https://snipboard.io/dO0W7S.jpg
Symmetric Encryption Symmetric algorithms use the same pre-shared key to encrypt and decrypt data.
A pre-shared key, also called a secret key, is known by the sender and receiver before any encrypted communications can take place.
To help illustrate how symmetric encryption works, consider an example where Alice and Bob live in different locations and want to exchange secret messages with one another through the mail system.
In this example, Alice wants to send a secret message to Bob.
Symmetric Encryption To help illustrate how symmetric encryption works, consider an example where Alice and Bob live in different locations and want to exchange secret messages with one another through the mail system.
In this example, Alice wants to send a secret message to Bob.
In the figure, Alice and Bob have identical keys to a single padlock.
These keys were exchanged prior to sending any secret messages. Alice writes a secret message and puts it in a small box that she locks using the padlock with her key. She mails the box to Bob.
The message is safely locked inside the box as the box makes its way through the post office system.
When Bob receives the box, he uses his key to unlock the padlock and retrieve the message.
Bob can use the same box and padlock to send a secret reply back to Alice.
https://snipboard.io/XpOlrK.jpg
Symmetric Encryption In the figure, Alice and Bob have identical keys to a single padlock. These keys were exchanged prior to sending any secret messages.
Alice writes a secret message and puts it in a small box that she locks using the padlock with her key. She mails the box to Bob.
The message is safely locked inside the box as the box makes its way through the post office system. When Bob receives the box, he uses his key to unlock the padlock and retrieve the message.
Bob can use the same box and padlock to send a secret reply back to Alice.
https://snipboard.io/XpOlrK.jpg
Today, symmetric encryption algorithms are commonly used with VPN traffic.
This is because symmetric algorithms use less CPU resources than asymmetric encryption algorithms. This allows the encryption and decryption of data to be fast when using a VPN.
When using symmetric encryption algorithms, like any other type of encryption, the longer the key, the longer it will take for someone to discover the key.
Most encryption keys are between 112 and 256 bits. To ensure that the encryption is safe, a minimum key length of 128 bits should be used. Use a longer key for more secure communications.
Symmetric Encryption Today, symmetric encryption algorithms are commonly used with VPN traffic. This is because symmetric algorithms use less CPU resources than asymmetric encryption algorithms.
This allows the encryption and decryption of data to be fast when using a VPN. When using symmetric encryption algorithms, like any other type of encryption, the longer the key, the longer it will take for someone to discover the key.
Most encryption keys are between 112 and 256 bits. To ensure that the encryption is safe, a minimum key length of 128 bits should be used. Use a longer key for more secure communications.
Symmetric encryption algorithms are sometimes classified as either a block cipher or a stream cipher.
Click the buttons to learn about these two cipher modes.
Symmetric Encryption Symmetric encryption algorithms are sometimes classified as either a block cipher or a stream cipher.
Click the buttons to learn about these two cipher modes. :
BLOCK CIPHERS AND STREAM CIPHERS
BLOCK CIPHERS :
Block ciphers transform a fixed-length block of plaintext into a common block of ciphertext of 64 or 128 bits.
Common block ciphers include DES with a 64-bit block size and AES with a 128-bit block size.
https://snipboard.io/wNjKdT.jpg
Symmetric Encryption Symmetric encryption algorithms are sometimes classified as either a block cipher or a stream cipher.
Click the buttons to learn about these two cipher modes. :
BLOCK CIPHERS AND STREAM CIPHERS
STREAM CIPHERS :
Stream ciphers encrypt plaintext one byte or one bit at a time. Stream ciphers are basically a block cipher with a block size of one byte or bit.
Stream ciphers are typically faster than block ciphers because data is continuously encrypted.
Examples of stream ciphers include RC4 and A5 which is used to encrypt GSM cell phone communications.
https://snipboard.io/UHZFBO.jpg
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
Data Encryption Standard (DES) :
This is a legacy symmetric encryption algorithm. It uses a short key length that makes it insecure for most current uses.
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
3DES (Triple DES) :
The is the replacement for DES and repeats the DES algorithm process three times.
It should be avoided if possible as it is scheduled to be retired in 2023.
If implemented, use very short key lifetimes.
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
Advanced Encryption Standard (AES)
AES is a popular and recommended symmetric encryption algorithm.
It offers combinations of 128-, 192-, or 256-bit keys to encrypt 128, 192, or 256 bit-long data blocks.
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
Software-Optimized Encryption Algorithm (SEAL) SEAL is a faster alternative symmetric encryption algorithm to AES.
SEAL is a stream cypher that uses a 160-bit encryption key and has a lower impact on the CPU compared to other software-based algorithms.
Well-known symmetric encryption algorithms are described below:
Symmetric Encryption Algorithms:
– Data Encryption Standard (DES)
– 3DES (Triple DES)
– Advanced Encryption Standard (AES)
– Software-Optimized Encryption Algorithm (SEAL)
– Rivest ciphers (RC) series algorithms
Rivest ciphers (RC) series algorithms This algorithm was developed by Ron Rivest.
Several variations have been developed, but RC4 was the most prevalent in use.
RC4 is a stream cipher that was used to secure web traffic.
It has been found to have multiple vulnerabilities which have made it insecure.
RC4 should not be used.
Asymmetric Encryption
Asymmetric algorithms, also called public-key algorithms, are designed so that the key that is used for encryption is different from the key that is used for decryption, as shown in the figure.
The decryption key cannot, in any reasonable amount of time, be calculated from the encryption key and vice versa.
Asymmetric algorithms, also called public-key algorithms, are designed so that the key that is used for encryption is different from the key that is used for decryption, as shown in the figure.
The decryption key cannot, in any reasonable amount of time, be calculated from the encryption key and vice versa.
Asymmetric Encryption Example
https://snipboard.io/6HFTSI.jpg
Asymmetric Encryption Asymmetric algorithms use a public key and a private key.
Both keys are capable of the encryption process, but the complementary paired key is required for decryption.
The process is also reversible.
Data that is encrypted with the public key requires the private key to decrypt.
Asymmetric algorithms achieve confidentiality and authenticity by using this process.
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Asymmetric Encryption
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Examples of protocols that use asymmetric key algorithms include:
– Internet Key Exchange (IKE)
– Secure Socket Layer (SSL)
– Secure Shell (SSH)
– Pretty Good Privacy (PGP)
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Examples of protocols that use asymmetric key algorithms include:
– Internet Key Exchange (IKE)
– Secure Socket Layer (SSL)
– Secure Shell (SSH)
– Pretty Good Privacy (PGP)
Internet Key Exchange (IKE) :
This is a fundamental component of IPsec VPNs.
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Examples of protocols that use asymmetric key algorithms include:
– Internet Key Exchange (IKE)
– Secure Socket Layer (SSL)
– Secure Shell (SSH)
– Pretty Good Privacy (PGP)
Secure Socket Layer (SSL) :
This is now implemented as IETF standard Transport Layer Security (TLS).
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Examples of protocols that use asymmetric key algorithms include:
– Internet Key Exchange (IKE)
– Secure Socket Layer (SSL)
– Secure Shell (SSH)
– Pretty Good Privacy (PGP)
Secure Shell (SSH):
This protocol provides a secure remote access connection to network devices.
Because neither party has a shared secret, very long key lengths must be used.
Asymmetric encryption can use key lengths between 512 to 4,096 bits.
Key lengths greater than or equal to 2,048 bits can be trusted, while key lengths of 1,024 or shorter are considered insufficient.
Examples of protocols that use asymmetric key algorithms include:
– Internet Key Exchange (IKE)
– Secure Socket Layer (SSL)
– Secure Shell (SSH)
– Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP):
This computer program provides cryptographic privacy and authentication.
It is often used to increase the security of email communications.
Asymmetric Encryption
Asymmetric algorithms are substantially slower than symmetric algorithms.
Their design is based on computational problems, such as factoring extremely large numbers or computing discrete logarithms of extremely large numbers.
Because they are slow, asymmetric algorithms are typically used in low-volume cryptographic mechanisms, such as digital signatures and key exchange.
However, the key management of asymmetric algorithms tends to be simpler than symmetric algorithms, because usually one of the two encryption or decryption keys can be made public.