Week 2-Summarize the Basics of Cryptographic Concepts Flashcards
Is the set of all possible keys that can be used in an encryption algorithm. (i.e. 56-bits=2^56, 256-bits=2^256 and 512-bits=2^512).
Keyspace
Is the process of changing the values. Complex substitution functions are used to create___
Confusion
The process of transforming plaintext (i.e. unencrypted data) into cipher text (i.e. encrypted data) using an algorithm and a secret key.
*The goal of ___ is confidentiality
Encryption
Is a measure of ensuring the:
*Authenticity
*Integrity
*Non-repudiation
of a digital document or message
Digital Signature
___means that the use of the algorithm & key length is allowed, but the user must accept some risk (weakness)
Deprecated
Is a process converting input data of arbitrary length into a fixed-sized output.
Known as a __value, digest or fingerprint
Hashing
Term used in cryptography to refer to a secret value used as a key, seed or initialization vector in an encryption or decryption algorithm.
Is a critical component of a cryptographic system, as it is used to transform plaintext & data into cyphertext or to decrypt ciphertext back to plaintext, the strength and security of the depends on its lenth, randomness and secrecy
Cryptovariable
The process of changing the order, sending bits through multiple rounds of transpositon is used to create___
Diffusion
Malicious code embedded in advertising
Malvertising
Hiding method:
modifying color space of a PNG image
Purpose:
hiding malicious code within a banner ad
Hiding method:
Malicious steganography
Purpose:
Segano
Hiding method:
Data hiding in HTML comment tags of the HTTP 404 error page
Purpose:
Embedding command and control commands
Hiding method:
Malicious seganography
Purpose:
Teslacrypt
Common symmetric encryption algorithms
3DES
AES
Common Asymmetric encryption algorithms
RSA, ECC, Difie-Hellman
__uses the same cryptographic key to encrypt and decrypt data.
*it is computationally efficient and can process large blocks of data.
*The disadvantages are key distribution and scalability
Symmetric encryption
__uses a pair of mathematically related keys.
*a private key and a public key.
*requires a lot of processing power and is slower.
*More suited for small blocks of data.
*advantage is scalability
Asymmetric encryption
_used to prove integrity
_produces a unique one-way fixed length
_representation of data set know as a __ , digest, checksum or fingerprint
_digests are compared and if they are the same then there is assurance that the data has not been modified
hash
Hash common algorithms are:
MDx
SHAx
__is used to prove authenticity of the message and verify the sender’s identy.
*A _ is a message digest encrypted with the sender’s private key.
Digital Signature
_are the mechanism used to generate a private key and to associate a public key with a collection of components sufficient to authenticate the claimed owner.
*The certificate is issued by a trusted certification authority, a web of trust, or self-generated and self-signed.
*is a unique ID for users, devices, applications and services.
Digital certificate
The cryptographic component used to ensure confidentiality.
Encryption
The cryptographic component used to prove integrity.
Hashing
The cryptographic component used to prove authenticity.
Digital signature
The number of keys used in asymmetric encryption
Two (public and private)
The key that is used to create a digital signature
the senders Private Key.
Security-In-Action
1) Your organization plans to begin digitally signing messages to prove authenticity.
2) You have been asked to eplain to the user community what the purpose of a digital signature is and how it works.
3) What do you tell them
A digital signature is used to verify (prove) that the message actually came from the sender and that it has not been modified in transmission.
*On behalf of the user, their messageing program will sign the message with a private key that is specific to the user.
*Technical details
The original message is hashed and a message digest is created. The message digest is encrypted with the senders private key. The recipient decrypts the message digest with the senders public key to validate the sender. The recipient also hashes the original message and compares the two message digests to validate that the message was not modified in transmission.
Common Certificate properties
Thumbprint**-Hash of the certificate (unique identifier)
Subject-name of the certificate. (DN,CN, O, OU)
**Issuer**-the entity that issued the certificate.
**SAN-Additional information about the subject.
Key Usage**- What the certificate can be used for.
**Version-X.509 certificate version
Valid From/To-Date **range in which the certificate is valid.
**CRL distribution-Location of the certificate revocation list
Public key-**Public key
**Algorithm-Algorithm used to sign the certificate.
Certificate Formats
PEM-**most common certificate format. Can include both the certificate and private key in one file or can be a separate file. Extensions include .pem, .crt, .cer, .key.
**Der-Binary form of a PEM. Extensions include .cer, .der.
P7B/PKCS#7-**Contains certificate but not the private key (Base64 encoded ASCII). Extensions include .p7b, .p7c.
**PFX/PKCS#12-contains certificate, intermediate certificate and private key (binary). Extensions include .pfx, .12
Types of Digital Certificates
Personal**-Verifies a user identity (generally used for email).
**Machine-Verifies a device identity.
Domain**-Verifies a domain (wildcards for subdomains)
Organization-Verifies a domain and an organization.
**Extended Validation**-Verifies a domain and an organization subject to additional standardized global verification processes.
**Code/Object signing-Verifies origination/ownership as well as object integrity.
*Trusted/Intermediate-Identifies root and intermediate Certificate Authorities.
Certificate Pinning
Forces a client application to validate the server’s certificate against a known copy.
*pinning can be preloaded into the application, or it can automatically pin whatever certificate the server sends during the first client-to-server call.
preloading protects the application, as an attacker might be able to pin their own certificate upon the first call.
*Use case
Pinning is intended to add a layer of security against a Man-in-the -Middle attack.
Security-In-Action Certificate Assurance
Your organization is planning on launching a customer facing website. It is very important that customers feel confident bout the trustworthiness of the site.
You have been asked which certificate is better-Domain Validation, Organizational validation, or Extended validation-and why?
What is your response
Response:
Domain validation only requires that the website owner demonstrate control over the domain.
Organizational validation documents information about the site operator but the user needs to open the certificate to see the datails.
Extended validation*requires that an organization demonstrate exclusive rights to use a domain, confirm its legal, operational and physical existence, and prove that the entity has authorized the issuance of the certificate. **Clicking on the padlock will reveal that the certificate is EV. Unfortunately the “green bar” is no longer in use.
Answer is Extended validation
Trused Certificate Phases
Enrollment-Enrollment initiated by users request to a Certificate Authority.
Validation-When a certificate is used, that status is checked to verify that it tis still operationally valid.
Suspension-Temporary revocation of a certificate until a certificate problem can be resolved.
Revocation-Permanent withdrawl of trust by issuing authority before scheduled expiration date.
Renewal-Prior to a certificate reaching its expiration date, it must be renewd
Destruction-When a certificate is no longer in use (expired or revoked), the certificate and backup copies should be destroyed along with the associated private key.
Enrollment-Certificate Authority (CA)
Digital certificates are issued by commercial trusted parties, called Certificate Authorities (CA).
* Browsers and devices trust a CA by accepting the Root Certificate into its root store-essentially a database of approved CAs that come pre-installed with the browser or device.
* CAs use these pre-installed Root Certificates to issue Intermediate Root Certificates and entity Digital Certificates.
*the CA receives certificate requests, validates the applications, issues the certificates, and publishes the ongoing validity status of issued certificates.
Registration Authority
A Registration Authority (RA) offloads some of the work from the CA.
* The RA can accept and process registration requests and distrubute certificates.
* A Local Registration Authority (LRA) requires physical identification. (rare occasion, must go to office to prove validity).
Certificate Request Process
1). Applicant generates a public/private key.
2). Applicant submits certificate request (Identifying info + public key)
3). The CA (or RA) validates identity of the applicant.
4). The CA generates a certificate and signs it with their private key.
5). The CA (or RA) sends the certificate to the applicant.
Enrollment Self-generated certificate
Digital certificates can be self-generated and self-signed.
*Problems with self-generated/signed
1. A self-signed certificate can be easily impersonated.
2. Presents warning message when used.
3. Cannot be revoked.
Use Case:
Internal development
NOTE:
Self-generated certificates can be signed and validated by other users-referred to as web of trust.
Certificate Validity
Certificate Revocation List (CRL)-CA maintained list of certificates that have been revoked.
* Pull model-CRL is downloaded by the user or organization.
* Push model-CRL is automatically sent out by the CA at regular intervals.
Online Certificate Status Protocol (OCSP)- Process designed to query the status of certificate in real-time.
* OCSP stapling is a time-stamped (cached) OCSP response.
Key Management
Describes the activities involving the handling of cryptographic keys and other related security parameters. (e.g., passwords) during their lifecycle.
* The includes generation, exchange, store, use strength crypto-shedding (destruction) and replacement.
* A Key management Practices Statement (KMPS) is a document tht describes in detail the organizational structure, responisble roles and rules for key management.
Key Management Best Practices
1). Usage- A key should only be used for one purpose (e.g. encryption).
* The use of the same key for different cryptographic purposes may weaken the security provided by one or both.
2). Strength-The strength of the key should be commensurate with the data/process protection requirements.
* 3)Storage-Private keys must be securely stored. The measures taken to protect a private key must be at least equal to the required security of the use of the key.
* A hardware security module (HSM) can be used to store cryptographic keys in tamper resistant hardware providing both logical and physical protection (plug-in card or external device).
Key Escrow
Is a proactive arrangement in which keys needed to decrypt data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
What type of certificate does a CA have?
A CA has a root certificate, which it uses to sign certificates.
If you are going to use a CA internally what type of CA should you choose?
You would use a private CA for internal use only; these certificates will not be accepted outside of your organization.
If you want to carry out B2B activity with third-party companies or sell products on the web, waht type of CA should you use?
B2B=Business to Business
You would use a public CA for B2B.
Why should you take your CA offline when not in use?
If you were a military, security, or banking organization, you would keep the CA offline when it is not being used to prevent it from being compromised.
What type of encryption does PKI use?
PKI=Public Key infrastructure
PKI uses asymmetric encryption.
Who signs X509 certificates
The CA signs the X509 certificate.
What can you use to prevent your CA from being compromised and fradulent certificates from being issued?
Certificate pinning can be used to prevent a CA from being compromised and fraudulent certificates from being issued.
If two entiteis want to setup a cross-certification, what must they setup first?
If two separate PKI entities want to setup cross-certificaton, the root CAs would set up a trust model between themselves, known as a bridge trust model.
What type of trust model does the PGP use?
PGP=Pretty Good Privacy
PGP uses a trust model known as a web of trust.
How can you tell whether your certificate is valid?
A Certificate Revocation List (CRL) is used to determine whether a certificate is valid.
If the CRL is going slowly, what should you implement?
If the CRL is going slow, you should use OCSP as it provides faster validation.
* Use OCSP instead of CRLs: Online Certificate Status Protocol (OCSP) provides real-time revocation status information without the need for downloading and parsing a large CRL. OCSP can be faster and more efficient than CRLs, especially in high-traffic environments.
OCSP=Online Certificate Status Protocol
Explain certificate stapling/OCSP stapling
Certificate stapling/OCSP stapling is where a web server uses and OCSP for faster certificate authentication, bypassing CRL.
What is the process of obtaining a new certificate?
You would submit a Certificate Signing Request (CSR) to request a new certificate.
What is the purpose of the key escrow?
The key escrow stores and manages private keys for third parties.
What is the purpose of the HSM?
HSM=Hardware Security Module
A hardware security module (HSM) is used by the key escrow to securely store and manage certificates.
What is the purpose of the DRA, and what does it need to complete its role effectively?
DRA=Disaster Recovery Agent
The purpose of the Disaster Recovery Agent (DRA) is to recover data when a user’s private key becomes corrupt. To do this, it must first obtain a copy of the private key from the key escrow.
How can you identify each certificate?
Each certificate can be identified by its OID, which is similar to a serial number.
OID=Object identifyer
What format (PKCS is a private certificate, and what file extension does it have?
PKCS =Public-Key Cryptography Standards
A private certificate is in P12 format with a .pfx extension.
What format (PKCS) is a public certificate, and what file extension does it have?
PKCS =Public-Key Cryptography Standards
A public certificate is in P7B format with a .cer extension.