SlideShare a Scribd company logo
1 of 28
Crypto IV
p. 862 - 888
Digital Signature
-a digital signature is intended to be
comparable to a handwritten signature
-provide assurance that the message does
indeed come from the person who claims
to have sent it, it has not been altered,
both parties have a copy of the same
document
Digital Signature Standard (DSS)
-FIPS 186
-uses 2 methods for created a signature. The
RSA method and the DSS method
-It will be appended to the message
-Both methods begin by hashing the
message
RSA
-RSA will then encrypt the
hash with the sender’s
private key, thus
creating the signature

DSS
-DSS approach is to sign
the hash using DSA.
The DSA uses a
random num to create
a private & public key,
then encrypts the hash
value
Non-Repudiation
-service that ensures the sender cannot deny
a message was sent and the integrity of
the message is intact
-NIST SP800-57
Methods of Cryptanalytic Attacks
Chosen Plain-Text
-attacker knows the algorithm and is trying to determine
the key
-attacker will put in multiple known inputs and use the
output to determine the key
Social Engineering for Key Discovery
-use of coercion, bribery, befriending people in positions
of powers
Brute Force
-trying all possible keys until one is found that decrypt
the ciphertext, this is why length is important
Linear Cryptanalysis
-is a known plaintext attack that uses linear
approximations to describe the behavior of the block
cipher
Differential Cryptanalysis (Side Channel Attack)
-complex attack is executed by measuring the exact
execution times and power required by the crypto
device to perform the en/decryption.
-Measuring power consumption, clock cycles, etc makes
it possible to determine the value of the key and
algorithm used
Algebraic
-class of techniques that rely for their success on block
ciphers exhibiting a high degree of mathematical
structure
Ciphertext-Only Attack
-attacker only has ciphertext and tries to work
backwards
-the more examples the better chance of success
Randow Table
-to determine a given plaintext from its hash one of
these are done:
1) Hash each plaintext until matching hash is found
2) Do 1 but store each generated hash in a table that
can be used for future attacks
Known Plaintext
-attack has access to plain and cipher text of the
message
Frequency Analysis
-especially useful when attacking a substitution cipher
where statistics of the plaintext language are known
Chosen Cipher-Text
-when attacker has access to the decryption
device/software and decrypts chosen ciphertexts to
discover the key
-RSA gets whooped by this
Birthday Attack
-since a hash is a short representation of a message
there are two messages that will give the same hash
Dictionary Attack
-use dictionary words against a password file
Replay Attack
-meant to disrupt and damage processing by the
attacker sending repeated files to the host
Reverse Engineering
Factoring Attacks
-aimed at RSA algorithms
-since that algorithm uses the product of prime numbers
to generate the public and private keys, this attack
attempts to find the keys through solving the
factoring of these numbers
Attacking the Random Number Generators
-ability to guess nonces will greatly improve the attack
success rate
Temporary Files
-most cryptosystems use temporary files to perform their
calculations if the files are not cleared it may lead to
it being broken
Implementation Attacks
☻Side Channel Analysis: rely on physical attributes of
implementation
☻Fault Analysis: attempts to force the system into an
error state
☻Probing Attacks: watch the circuitry surrounding the
crypto module in hopes that the complementing
components will disclose info
Network Sec an Cryptography
Virtual Private Networks
-goal of VPN is to provide confidentiality & data integrity
of data transmission
-site to site: deploys 2+ VPN servers or appliances that
securely connect private networks together
-remove access: securely connects a user’s computer to
another user’s computer or VPN server
-each VPN member must be configured to use the same
cryptoparamerters
E-Commerce
-crypto continues to enable trust between businesses
and consumers
IPSec
-developed to provide security over Internet connections
and prevent IP spoofing, eavesdropping, and misuse
of IP based authentication
-operates with IPv4 and IPv6
SSL/TLS
-encrypts messages using symmetric algorithms, also
calculates MAC
Application Security and Crypto
-Email is the most common business communication, so
it is important to secure
Email protocols and standards
☻Privacy Enhanced Mail (PEM) RFC 1421-1424
-provides message integrity; message origin &
authentication; confidentiality, has a sweet
encapsulating boundry
☻Pretty Good Privacy (PGP)
-gives the user a choice of which encryption algorithm to
use i.e. CAST, 3DES
-establishes trust based on relationships
☻Secure/Multipurpose Internet Mail Extension S/MIME
-provides signed & encrypted mail messages
-similar to IPSec & SSL as it uses hash functions &
as/symetric crypto
Public Key Infrastructure PKI
-PKI is a set of system, software, and communication
protocols required to use, manage, and control public
key crypto.
It has 3 primary purposes
1. Publish keys/Certs
2. Certify that a key is tied to an individual/entity
3. Provide Verification of the validity of a public key
-The CA “signs” an entities digital certificate to certify
that the certificate accurately represents the
certificate owner
-Functions of a CA may be spread among several
servers
-CA can revoke certs & provide an update service to the
other members of the PKI via a certificate revocation
list (CRL), a list of non-valid certs that should not be
accepted by any member of the PKI
-Set up a trusted public directory of keys, each user
must register with the directory service, it could
delete & add keys automatically
-use public key certs, this can be done directly or thru a
CA which would act as a trusted 3rd party
Certificate Related Issues
-users may/will have to communicate with users from
another CA, so CAs must have a method of crosscertifying one another
-Business agreements & PKI policies are negotiated,
then each CA signs the others public key, or root
cert, thus establishing a cert chain
-3 Basic Ways of constraining trust between CAs
1. Path Length: Orgs can control whether their CA
should trust any cross-cert relationships that have
been established by CAs with orgs have cross-certed
2. Name: In peer-to-peer cross-cert, name constraints
are used to limit trust to a subgroup of cross-certed
CAs based on their distinguished name (DN)
3. Policy: can be used to limit trust only to those users in
another CA who have certain policy values in their
certs
Information Hiding Alternatives
Steganography
-hiding a message inside of another medium
Watermarking
-the addition of identifiable info into a file or document,
this is often done to detect the improper copying or
theft of info
Summary & Conclusion
Crypto, use it or lose it.

More Related Content

What's hot

BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
limsh
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
limsh
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
Muqeed Abdul
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

What's hot (20)

BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Security
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Viewers also liked (18)

CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposal
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to CISSP Week 21

Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
Erica StJohn
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
sandyBS
 

Similar to CISSP Week 21 (20)

Unit v
Unit vUnit v
Unit v
 
Ch15
Ch15Ch15
Ch15
 
network security
network securitynetwork security
network security
 
Security
SecuritySecurity
Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 2.Cryptography and Cryptanalysis
Module 2.Cryptography and CryptanalysisModule 2.Cryptography and Cryptanalysis
Module 2.Cryptography and Cryptanalysis
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Cryptography
CryptographyCryptography
Cryptography
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

CISSP Week 21

  • 2. Digital Signature -a digital signature is intended to be comparable to a handwritten signature -provide assurance that the message does indeed come from the person who claims to have sent it, it has not been altered, both parties have a copy of the same document
  • 3. Digital Signature Standard (DSS) -FIPS 186 -uses 2 methods for created a signature. The RSA method and the DSS method -It will be appended to the message -Both methods begin by hashing the message
  • 4. RSA -RSA will then encrypt the hash with the sender’s private key, thus creating the signature DSS -DSS approach is to sign the hash using DSA. The DSA uses a random num to create a private & public key, then encrypts the hash value
  • 5. Non-Repudiation -service that ensures the sender cannot deny a message was sent and the integrity of the message is intact -NIST SP800-57
  • 6. Methods of Cryptanalytic Attacks Chosen Plain-Text -attacker knows the algorithm and is trying to determine the key -attacker will put in multiple known inputs and use the output to determine the key Social Engineering for Key Discovery -use of coercion, bribery, befriending people in positions of powers
  • 7. Brute Force -trying all possible keys until one is found that decrypt the ciphertext, this is why length is important Linear Cryptanalysis -is a known plaintext attack that uses linear approximations to describe the behavior of the block cipher
  • 8. Differential Cryptanalysis (Side Channel Attack) -complex attack is executed by measuring the exact execution times and power required by the crypto device to perform the en/decryption. -Measuring power consumption, clock cycles, etc makes it possible to determine the value of the key and algorithm used
  • 9. Algebraic -class of techniques that rely for their success on block ciphers exhibiting a high degree of mathematical structure Ciphertext-Only Attack -attacker only has ciphertext and tries to work backwards -the more examples the better chance of success
  • 10. Randow Table -to determine a given plaintext from its hash one of these are done: 1) Hash each plaintext until matching hash is found 2) Do 1 but store each generated hash in a table that can be used for future attacks
  • 11. Known Plaintext -attack has access to plain and cipher text of the message Frequency Analysis -especially useful when attacking a substitution cipher where statistics of the plaintext language are known
  • 12. Chosen Cipher-Text -when attacker has access to the decryption device/software and decrypts chosen ciphertexts to discover the key -RSA gets whooped by this Birthday Attack -since a hash is a short representation of a message there are two messages that will give the same hash
  • 13. Dictionary Attack -use dictionary words against a password file Replay Attack -meant to disrupt and damage processing by the attacker sending repeated files to the host Reverse Engineering
  • 14. Factoring Attacks -aimed at RSA algorithms -since that algorithm uses the product of prime numbers to generate the public and private keys, this attack attempts to find the keys through solving the factoring of these numbers
  • 15. Attacking the Random Number Generators -ability to guess nonces will greatly improve the attack success rate Temporary Files -most cryptosystems use temporary files to perform their calculations if the files are not cleared it may lead to it being broken
  • 16. Implementation Attacks ☻Side Channel Analysis: rely on physical attributes of implementation ☻Fault Analysis: attempts to force the system into an error state ☻Probing Attacks: watch the circuitry surrounding the crypto module in hopes that the complementing components will disclose info
  • 17. Network Sec an Cryptography Virtual Private Networks -goal of VPN is to provide confidentiality & data integrity of data transmission -site to site: deploys 2+ VPN servers or appliances that securely connect private networks together -remove access: securely connects a user’s computer to another user’s computer or VPN server -each VPN member must be configured to use the same cryptoparamerters
  • 18. E-Commerce -crypto continues to enable trust between businesses and consumers IPSec -developed to provide security over Internet connections and prevent IP spoofing, eavesdropping, and misuse of IP based authentication -operates with IPv4 and IPv6
  • 19. SSL/TLS -encrypts messages using symmetric algorithms, also calculates MAC
  • 20. Application Security and Crypto -Email is the most common business communication, so it is important to secure Email protocols and standards ☻Privacy Enhanced Mail (PEM) RFC 1421-1424 -provides message integrity; message origin & authentication; confidentiality, has a sweet encapsulating boundry
  • 21. ☻Pretty Good Privacy (PGP) -gives the user a choice of which encryption algorithm to use i.e. CAST, 3DES -establishes trust based on relationships ☻Secure/Multipurpose Internet Mail Extension S/MIME -provides signed & encrypted mail messages -similar to IPSec & SSL as it uses hash functions & as/symetric crypto
  • 22. Public Key Infrastructure PKI -PKI is a set of system, software, and communication protocols required to use, manage, and control public key crypto. It has 3 primary purposes 1. Publish keys/Certs 2. Certify that a key is tied to an individual/entity 3. Provide Verification of the validity of a public key
  • 23. -The CA “signs” an entities digital certificate to certify that the certificate accurately represents the certificate owner -Functions of a CA may be spread among several servers -CA can revoke certs & provide an update service to the other members of the PKI via a certificate revocation list (CRL), a list of non-valid certs that should not be accepted by any member of the PKI
  • 24. -Set up a trusted public directory of keys, each user must register with the directory service, it could delete & add keys automatically -use public key certs, this can be done directly or thru a CA which would act as a trusted 3rd party
  • 25. Certificate Related Issues -users may/will have to communicate with users from another CA, so CAs must have a method of crosscertifying one another -Business agreements & PKI policies are negotiated, then each CA signs the others public key, or root cert, thus establishing a cert chain -3 Basic Ways of constraining trust between CAs
  • 26. 1. Path Length: Orgs can control whether their CA should trust any cross-cert relationships that have been established by CAs with orgs have cross-certed 2. Name: In peer-to-peer cross-cert, name constraints are used to limit trust to a subgroup of cross-certed CAs based on their distinguished name (DN) 3. Policy: can be used to limit trust only to those users in another CA who have certain policy values in their certs
  • 27. Information Hiding Alternatives Steganography -hiding a message inside of another medium Watermarking -the addition of identifiable info into a file or document, this is often done to detect the improper copying or theft of info
  • 28. Summary & Conclusion Crypto, use it or lose it.