SlideShare a Scribd company logo
1 of 59
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 4
Advanced Cryptography and PKI
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectives
4.1 Explain how to implement cryptography
4.2 Define digital certificates
4.3 Describe the components of Public Key
Infrastructure (PKI)
4.4 Describe the different transport encryption protocols
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
3
Implementing Cryptography
• Cryptography that is improperly applied can lead to vulnerabilities
• It is essential to understand the different options that relate to
cryptography
• Implementing cryptography includes understanding:
• Key strength
• Secret algorithms
• Block cipher modes of operation
• Cryptographic service providers
• The use of algorithm input values
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
4
Key Strength (1 of 2)
• Cryptographic key
• A value that serves as input to an algorithm
• Transforms plaintext into ciphertext (and vice versa for decryption)
• Three primary characteristics that determine the resiliency of the key
to attacks (called key strength)
• Randomness
• Length of the key
• Cryptoperiod – length of time for which a key is authorized for use
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
5
Key Strength (2 of 2)
Key length Key space Average number of
attempts needed to break
3 17,576 8788
4 456,976 228,488
5 11,881,376 5,940,688
6 308,915,776 154,457,888
7 8,031,810,176 4,015,905,088
8 208,827,064,576 104,413,532,288
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
6
Secret Algorithms
• Would a secret algorithm enhance security in the same way as
keeping a key or password secret?
• No
• For a cryptography to be useful it needs to be widespread:
• A military force that uses cryptography must allow many users
to know of its existence to use it
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
7
Block Cipher Modes of Operation
• A block cipher manipulates an entire block of plaintext at one time
• The plaintext is divided into separate blocks of specific lengths
• Each block is encrypted independently
• Block cipher mode of operation
• Specifies how block ciphers should handle these blocks
• Most common modes:
• Electronic Code Book (ECB)
• Cipher Block Chaining (CBC)
• Counter (CTR)
• Galois/Counter (GCM)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
8
Crypto Service Providers (1 of 2)
• Crypto service provider
• Allows an application to implement an encryption algorithm for
execution
• Crypto service providers typically:
• Implement cryptographic algorithms
• Generate keys
• Provide key storage
• Authenticate users by calling various crypto modules to perform
specific tasks
• Crypto service providers can be implemented in:
• Software, hardware, or both
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
9
Crypto Service Providers (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
10
Algorithm Input Values
• Some cryptographic algorithms require that in addition to a key another
value can or must be input
• May be called algorithm input values
• Salt
• A value that can be used to ensure that plaintext, when hashed, will
not consistently result in the same digest
• Most often used in password-based systems
• Nonce
• An input value that must be unique within some specified scope
• Initialization vector (IV)
• Most widely used algorithm input
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
11
Digital Certificates
• Digital Certificates
• A common application of cryptography
• Using digital certificates involves
• Understanding their purpose
• Knowing how they are managed
• Determining which type of digital certificate is appropriate for different
situations
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
12
Defining Digital Certificates (1 of 3)
• Digital signature
• Used to prove a document originated from a valid sender
• Weakness of using digital signatures
• They only show that the private key of the sender was used to
encrypt the digital signature
• Imposter could post a public key under a sender’s name
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
13
Defining Digital Certificates (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
14
Defining Digital Certificates (3 of 3)
• Trusted third party
• Used to help solve the problem of verifying identity
• Verifies the owner and that the public key belongs to that owner
• Helps prevent man-in-the-middle attack that impersonates owner of
public key
• A digital certificate is a technology used to associate a user’s identity
to a public key
• That has been “digitally signed” by a trusted third party
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
15
Managing Digital Certificates
• Several entities and technologies are used to manage digital certificates:
• Certificate authorities (CAs)
• Tools for managing certificates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
16
Certificate Authorities (1 of 3)
• Certificate authority (CA)
• Responsible for digital certificates
• May also be called root CA
• If a user wants a digital certificate:
• After generating a public and private key, user must complete a
request with information such as name, address, email address, etc.
• Known as a Certificate Signing Request (CSR)
• User electronically signs the CSR and sends it to an intermediate CA
• Intermediate CA processes the CSR and verifies the authenticity of
the user
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
17
Certificate Authorities (2 of 3)
Car title scenario Digital certificate
element
Explanation
Car title
application
Certificate Signing
Request (CSR)
Formal request for
digital certificate
Sign car title
application
Create and affix public
key to certificate
Added to digital
certificate for security
Visit county
courthouse
Intermediate certificate
authority
Party that can process
CSR on behalf of CA
Title sent from
state DMV
Certificate authority (CA) Party responsible for
digital certificates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
18
Certificate Authorities (3 of 3)
• Intermediate CAs are subordinate entities designed to handle specific
C A tasks such as:
• Processing certificate requests
• Verifying the identity of the individual
• The person requesting a digital certificate can be authenticated by:
• Email, documents, in person
• A common method to ensure security and integrity of a root CA:
• Keep it in an offline state from the network (offline CA)
• It is only brought online (online CA) when needed for specific and
infrequent tasks
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
19
Certificate Management (1 of 4)
• Certificate Repository (CR)
• Publicly accessible centralized directory of digital certificates
• Can be used to view certificate status
• Can be managed locally by setting it up as a storage area connected to
the CA server
• Certificate Revocation
• Lists of digital certificate that have been revoked
• Reasons a certificate would be revoked
- Certificate is no longer used
- Details of the certificate have changed, such as user’s address
- Private key has been lost or exposed (or suspected lost or exposed)
• Certificate Revocation List (CRL)
- A list of certificate serial numbers that have been revoked
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
20
Certificate Management (2 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
21
Certificate Management (3 of 4)
• Online Certificate Status Protocol (OCSP)
• Performs a real-time lookup of a certificate’s status
• Called a request-response protocol
• The browser sends the certificate’s information to a trusted entity
known as an OCSP Responder
• The OCSP Responder provides immediate revocation information
on that certificate
• OCSP stapling
• A variation of OCSP where web servers send queries to the OCSP
Responder server at regular intervals to receive a signed time-
stamped response
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
22
Certificate Management (4 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
23
Types of Digital Certificates
• Different categories of digital certificates
• The most common categories are:
• Root certificates
• Domain certificates
• Hardware and software certificates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
24
Root Digital Certificates (1 of 4)
• The process of verifying a digital certificate is genuine depends upon
certificate chaining
• Links several certificates together to establish trust between all the
certificates involved
• Endpoint of the chain is the user digital certificate itself
• The beginning point of the chain is known as a root digital certificate
• Created and verified by a CA
• Self-signed and do not depend upon any higher-level authority
• Between root digital certificate and the user certificate can be
• One or more intermediate certificates issued by intermediate CAs
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
25
Root Digital Certificates (2 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
26
Root Digital Certificates (3 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
27
Root Digital Certificates (4 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
28
Domain Digital Certificates (1 of 5)
• Most digital certificates are web server digital certificates issued from
a web server to a client
• Web server digital certificates perform two primary functions:
• Ensure the authenticity of the web server to the client
• Ensure the authenticity of the cryptographic connection to the web
server
• Several types of domain digital certificates:
• Domain validation digital certificates
• Extended validation digital certificates
• Wildcard digital certificates
• Subject alternative names digital certificates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
29
Domain Digital Certificates (2 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
30
Domain Digital Certificates (3 of 5)
• Domain validation digital certificate
• Verifies the identify of the entity that has control over the domain name
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
31
Domain Digital Certificates (4 of 5)
• Extended Validation (EV)
• This type of certificate requires more extensive verification of the
legitimacy of the business
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
32
Domain Digital Certificates (5 of 5)
• Wildcard digital certificate
• Used to validate a main domain along with all subdomains
• Subject Alternative Name (SAN) digital certificate
• Also known as a Unified Communications Certificate (UCC)
• Primarily used for Microsoft Exchange servers or unified
communications
• Hardware and Software digital certificates
• Machine digital certificate
• Code signing digital certificate
• Email digital certificate
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
33
Digital Certificate Formats
• The most widely accepted digital certificates are defined by a division
of the ITU
• Known as the Telecommunication Standardization Sector (ITU-T)
• Adhere to the x.509 standard
• All x.509 certificates follow the standard ITU-T x.690, which specifies
one of three encoding formats:
• Basic Encoding Rules (BER)
• Canonical Encoding Rules (CER)
• Distinguished Encoding Rules (DER)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
34
Public Key Infrastructure (PKI)
• Important management tool for the use of:
• Digital certificates:
• Asymmetric cryptography
• Important to understand PKI
• How it is managed
• How key management is performed
• Know PKI trust models
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
35
What is Public Key Infrastructure (PKI)?
• There is a need for a consistent means to manage digital certificates
• Public key infrastructure (PKI) - a framework for all entities involved
in digital certificates
• Certificate management actions facilitated by PKI
• Create
• Store
• Distribute
• Revoke
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
36
Trust Models
• Trust
• Confidence in or reliance on another person or entity
• Trust model
• Refers to the type of trust relationship that can exist between
individuals and entities
• Direct trust
• A type of trust model where one person knows the other person
• Third-party trust
• Two individuals trust each other because each trusts a third party
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
37
Hierarchical Trust Model (1 of 2)
• Hierarchical Trust Model
• Assigns a single hierarchy with one master CA called the root
• The root signs all digital certificate authorities with a single key
• Can be used in an organization where one CA is responsible for only
that organization’s digital certificates
• Hierarchical trust model limitations:
• A single CA private key may be compromised rendering all certificates
worthless
• Having a single CA who must verify and sign all digital certificates may
create a significant backlog
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
38
Hierarchical Trust Model (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
39
Distributed Trust Model
• Distributed Trust Model
• Multiple CAs sign digital certificates
• Eliminates limitations of hierarchical trust model
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
40
Bridge Trust Model (1 of 2)
• Bridge Trust Model
• One CA acts as facilitator to interconnect connect all other CAs
• Facilitator CA does not issue digital certificates, instead it acts
as hub between hierarchical and distributed trust model
• Allows the different models to be linked
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
41
Bridge Trust Model (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
42
Managing PKI (1 of 2)
• Certificate Policy (CP)
• A published set of rules that govern operation of a PKI
• Provides recommended baseline security requirements for the use
and operation of CA, RA, and other PKI components
• Certificate Practice Statement (CPS)
• A technical document that describes in detail how the CA uses and
manages certificates
• Also covers how to register for a digital certificate, how to issue them,
when to revoke them, procedural controls and key pair management
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
43
Managing PKI (2 of 2)
• Certificate life cycle
• Creation
-Occurs after user is positively identified
• Suspension
-May occur when employee on leave of absence
• Revocation
-Certificate no longer valid
• Expiration
-Key can no longer be used
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
44
Key Management
• Key Management includes:
• Key storage
• Key usage
• Key handling procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
45
Key Storage
• Means of public key storage
• Embedding within digital certificates
• Means of private key storage
• Stored on user’s local system
• Software-based storage may expose keys to attackers
• Alternative: storing keys in hardware
• Smart-cards
• Tokens
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
46
Key Usage
• Multiple pairs of dual keys can be created
• If more security is needed than a single set of public/private keys
• One pair used to encrypt information
-Public key backed up in another location
• Second pair used only for digital signatures
-Public key in that pair would never be backed up
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
47
Key Handling Procedures (1 of 3)
• Key escrow
• Keys are managed by a third party, such as a trusted CA
• Private key is split and each half is encrypted
• Two halves sent to third party, which stores each half in separate
location
• User can retrieve and combine two halves and use this new copy
of private key for decryption
• Expiration
• Keys expire after a set period of time
• Renewal
• Existing key can be renewed
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
48
Key Handling Procedures (2 of 3)
• Revocation
• Keys may be revoked prior to its expiration date
• Revoked keys may not be reinstated
• Recovery
• Need to recover keys of an employee hospitalized for extended period
• Key recovery agent (KRA) may be used
• Group of people may be used (M-of-N control)
• Suspension
• Suspended for a set period of time and then reinstated
• Destruction
• Removes all public and private keys and user’s identification from the
CA
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
49
Key Handling Procedures (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
50
Cryptographic Transport Protocols
• Most common cryptographic transport algorithms:
• Secure Sockets Layer
• Transport Layer Security
• Secure Shell
• Hypertext Transport Protocol Secure
• S/MIME
• Secure Real-time Transport Protocol
• IP Security
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
51
Secure Sockets Layer (SSL)
• Secure Sockets Layer (SSL)
• One of the most common transport algorithms
• Developed by Netscape
• Design goal was to create an encrypted data path between a client
and a server
• Uses the Advanced Encryption Standard (AES)
• SSL version 3.0 is the current version
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
52
Transport Layer Security (TLS)
• Transport Layer Security (TLS)
• SSL v3.0 served as the basis for TLS v1.0
• Versions starting with v1.1 are significantly more secure than SSL v3.0
• Current version is TLS v1.2
• Cipher suite
• A named combination of the encryption, authentication, and message
authentication code (MAC) algorithms that are used with SSL and TLS
• Length of keys - a factor in determining the overall security of a
transmission
• Keys of less than 2048 bits are considered weak
• Keys of 2048 bits are considered good
• Keys of 4096 bits are strong
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
53
Secure Shell (SSH)
• An encrypted alternative to the Telnet protocol used to access remote
computers
• It is a Linux/UNIX-based command interface and protocol
• SSH is a suite of three utilities: slogin, ssh, and scp
• Client and server ends of the connection are authenticated using a digital
certificate and passwords are encrypted
• Can be used as a tool for secure network backups
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
54
Hypertext Transport Protocol Secure (HTTPS)
• A common use of TLS and SSL:
• To secure Hypertext Transport Protocol (HTTP) communications
between browser and Web server
• The secure version is actually “plain” HTTP sent over SSL or TLS
• Called Hypertext Transport Protocol Secure (HTTPS) and uses port
443 instead of HTTP’s port 80
• Users must enter URL s with https://
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
55
Secure/Multipurpose Internet Mail Extensions
(S/MIME)
• Secure/Multipurpose Internet Mail Extensions (S/MIME)
• A protocol for securing email messages
• Allows users to send encrypted messages that are also digitally signed
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
56
Secure Real-time Transport Protocol (SRTP)
• Secure Real-time Transport Protocol (SRTP)
• A secure extension protecting transmission using the Real-time
Transport Protocol (RTP)
• SRTP provides protection for Voice over IP (VoIP) communications
• Adds security features such as message authentication and
confidentiality for VoIP Communications
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
57
IP Security (IPsec)
• IPsec is considered to be a transparent security protocol
• Transparent to applications, users, and software
• IPsec provides three areas of protection that correspond to three IPsec
protocols:
• Authentication
• Confidentiality
• Key management
• Supports two encryption modes:
• Transport - encrypts only the data portion of each packet and leaves
the header unencrypted
• Tunnel - encrypts both the header and the data portion
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
58
Chapter Summary (1 of 2)
• Cryptography that is improperly applied can lead to vulnerabilities that will
be exploited
• A digital certificate is the user’s public key that has been digitally signed by
a trusted third party who verifies the owner and that the public key belongs
to that owner
• A certificate repository (CR) is a list of approved digital certificates
• Revoked digital certificates are listed in a Certificate Revocation List (RCL)
• Status can also be checked through the Online Certificate Status
Protocol (OCSP)
• There are several different types of digital certificates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
59
Chapter Summary (2 of 2)
• Domain validation digital certificates verify the identity of the entity that
has control over the domain name but indicate nothing regarding the
trustworthiness of the individuals behind the site
• A public key infrastructure (PKI) is a framework for all the entities
involved in digital certificates to create, store, distribute, and revoke
digital certificates
• An organization that uses multiple digital certificates on a regular basis
needs to properly manage those digital certificates
• Cryptography is commonly used to protect data-in-transit
• SSL and TLS are widely used protocols
• IPsec is a set of protocols developed to support the secure exchange
of packets
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Dr. Ahmed Al Zaidy
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 

What's hot (20)

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Whitman_Ch03.pptx
Whitman_Ch03.pptxWhitman_Ch03.pptx
Whitman_Ch03.pptx
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 

Similar to Crypto Guide Explains Implementing Cryptography

Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docxlorainedeserre
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Steve Guinan
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxAliffDarfriz
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Intro to Web Design 6e Chapter 2
Intro to Web Design 6e Chapter 2 Intro to Web Design 6e Chapter 2
Intro to Web Design 6e Chapter 2 Steve Guinan
 
Software Development, Data Types, and Expressions
Software Development, Data Types, and ExpressionsSoftware Development, Data Types, and Expressions
Software Development, Data Types, and Expressionspullaravikumar
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528Arnaud Le Hors
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyNordic APIs
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Steve Guinan
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyNordic APIs
 
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...Amazon Web Services
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fimArchiver
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 

Similar to Crypto Guide Explains Implementing Cryptography (20)

Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
 
ITEC 1010
ITEC 1010ITEC 1010
ITEC 1010
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
ECM & Digital Signature
ECM & Digital SignatureECM & Digital Signature
ECM & Digital Signature
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Intro to Web Design 6e Chapter 2
Intro to Web Design 6e Chapter 2 Intro to Web Design 6e Chapter 2
Intro to Web Design 6e Chapter 2
 
Software Development, Data Types, and Expressions
Software Development, Data Types, and ExpressionsSoftware Development, Data Types, and Expressions
Software Development, Data Types, and Expressions
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
 
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...
Deep Dive on Amazon Managed Blockchain: re:Invent 2018 Recap at the AWS Loft ...
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (17)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 

Crypto Guide Explains Implementing Cryptography

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 4 Advanced Cryptography and PKI © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectives 4.1 Explain how to implement cryptography 4.2 Define digital certificates 4.3 Describe the components of Public Key Infrastructure (PKI) 4.4 Describe the different transport encryption protocols © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 3. 3 Implementing Cryptography • Cryptography that is improperly applied can lead to vulnerabilities • It is essential to understand the different options that relate to cryptography • Implementing cryptography includes understanding: • Key strength • Secret algorithms • Block cipher modes of operation • Cryptographic service providers • The use of algorithm input values © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Key Strength (1 of 2) • Cryptographic key • A value that serves as input to an algorithm • Transforms plaintext into ciphertext (and vice versa for decryption) • Three primary characteristics that determine the resiliency of the key to attacks (called key strength) • Randomness • Length of the key • Cryptoperiod – length of time for which a key is authorized for use © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Key Strength (2 of 2) Key length Key space Average number of attempts needed to break 3 17,576 8788 4 456,976 228,488 5 11,881,376 5,940,688 6 308,915,776 154,457,888 7 8,031,810,176 4,015,905,088 8 208,827,064,576 104,413,532,288 © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Secret Algorithms • Would a secret algorithm enhance security in the same way as keeping a key or password secret? • No • For a cryptography to be useful it needs to be widespread: • A military force that uses cryptography must allow many users to know of its existence to use it © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Block Cipher Modes of Operation • A block cipher manipulates an entire block of plaintext at one time • The plaintext is divided into separate blocks of specific lengths • Each block is encrypted independently • Block cipher mode of operation • Specifies how block ciphers should handle these blocks • Most common modes: • Electronic Code Book (ECB) • Cipher Block Chaining (CBC) • Counter (CTR) • Galois/Counter (GCM) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Crypto Service Providers (1 of 2) • Crypto service provider • Allows an application to implement an encryption algorithm for execution • Crypto service providers typically: • Implement cryptographic algorithms • Generate keys • Provide key storage • Authenticate users by calling various crypto modules to perform specific tasks • Crypto service providers can be implemented in: • Software, hardware, or both © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Crypto Service Providers (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Algorithm Input Values • Some cryptographic algorithms require that in addition to a key another value can or must be input • May be called algorithm input values • Salt • A value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest • Most often used in password-based systems • Nonce • An input value that must be unique within some specified scope • Initialization vector (IV) • Most widely used algorithm input © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Digital Certificates • Digital Certificates • A common application of cryptography • Using digital certificates involves • Understanding their purpose • Knowing how they are managed • Determining which type of digital certificate is appropriate for different situations © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 Defining Digital Certificates (1 of 3) • Digital signature • Used to prove a document originated from a valid sender • Weakness of using digital signatures • They only show that the private key of the sender was used to encrypt the digital signature • Imposter could post a public key under a sender’s name © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 Defining Digital Certificates (2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 Defining Digital Certificates (3 of 3) • Trusted third party • Used to help solve the problem of verifying identity • Verifies the owner and that the public key belongs to that owner • Helps prevent man-in-the-middle attack that impersonates owner of public key • A digital certificate is a technology used to associate a user’s identity to a public key • That has been “digitally signed” by a trusted third party © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 Managing Digital Certificates • Several entities and technologies are used to manage digital certificates: • Certificate authorities (CAs) • Tools for managing certificates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Certificate Authorities (1 of 3) • Certificate authority (CA) • Responsible for digital certificates • May also be called root CA • If a user wants a digital certificate: • After generating a public and private key, user must complete a request with information such as name, address, email address, etc. • Known as a Certificate Signing Request (CSR) • User electronically signs the CSR and sends it to an intermediate CA • Intermediate CA processes the CSR and verifies the authenticity of the user © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Certificate Authorities (2 of 3) Car title scenario Digital certificate element Explanation Car title application Certificate Signing Request (CSR) Formal request for digital certificate Sign car title application Create and affix public key to certificate Added to digital certificate for security Visit county courthouse Intermediate certificate authority Party that can process CSR on behalf of CA Title sent from state DMV Certificate authority (CA) Party responsible for digital certificates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Certificate Authorities (3 of 3) • Intermediate CAs are subordinate entities designed to handle specific C A tasks such as: • Processing certificate requests • Verifying the identity of the individual • The person requesting a digital certificate can be authenticated by: • Email, documents, in person • A common method to ensure security and integrity of a root CA: • Keep it in an offline state from the network (offline CA) • It is only brought online (online CA) when needed for specific and infrequent tasks © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Certificate Management (1 of 4) • Certificate Repository (CR) • Publicly accessible centralized directory of digital certificates • Can be used to view certificate status • Can be managed locally by setting it up as a storage area connected to the CA server • Certificate Revocation • Lists of digital certificate that have been revoked • Reasons a certificate would be revoked - Certificate is no longer used - Details of the certificate have changed, such as user’s address - Private key has been lost or exposed (or suspected lost or exposed) • Certificate Revocation List (CRL) - A list of certificate serial numbers that have been revoked © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Certificate Management (2 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Certificate Management (3 of 4) • Online Certificate Status Protocol (OCSP) • Performs a real-time lookup of a certificate’s status • Called a request-response protocol • The browser sends the certificate’s information to a trusted entity known as an OCSP Responder • The OCSP Responder provides immediate revocation information on that certificate • OCSP stapling • A variation of OCSP where web servers send queries to the OCSP Responder server at regular intervals to receive a signed time- stamped response © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Certificate Management (4 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Types of Digital Certificates • Different categories of digital certificates • The most common categories are: • Root certificates • Domain certificates • Hardware and software certificates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Root Digital Certificates (1 of 4) • The process of verifying a digital certificate is genuine depends upon certificate chaining • Links several certificates together to establish trust between all the certificates involved • Endpoint of the chain is the user digital certificate itself • The beginning point of the chain is known as a root digital certificate • Created and verified by a CA • Self-signed and do not depend upon any higher-level authority • Between root digital certificate and the user certificate can be • One or more intermediate certificates issued by intermediate CAs © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Root Digital Certificates (2 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Root Digital Certificates (3 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Root Digital Certificates (4 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Domain Digital Certificates (1 of 5) • Most digital certificates are web server digital certificates issued from a web server to a client • Web server digital certificates perform two primary functions: • Ensure the authenticity of the web server to the client • Ensure the authenticity of the cryptographic connection to the web server • Several types of domain digital certificates: • Domain validation digital certificates • Extended validation digital certificates • Wildcard digital certificates • Subject alternative names digital certificates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Domain Digital Certificates (2 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Domain Digital Certificates (3 of 5) • Domain validation digital certificate • Verifies the identify of the entity that has control over the domain name © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Domain Digital Certificates (4 of 5) • Extended Validation (EV) • This type of certificate requires more extensive verification of the legitimacy of the business © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Domain Digital Certificates (5 of 5) • Wildcard digital certificate • Used to validate a main domain along with all subdomains • Subject Alternative Name (SAN) digital certificate • Also known as a Unified Communications Certificate (UCC) • Primarily used for Microsoft Exchange servers or unified communications • Hardware and Software digital certificates • Machine digital certificate • Code signing digital certificate • Email digital certificate © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Digital Certificate Formats • The most widely accepted digital certificates are defined by a division of the ITU • Known as the Telecommunication Standardization Sector (ITU-T) • Adhere to the x.509 standard • All x.509 certificates follow the standard ITU-T x.690, which specifies one of three encoding formats: • Basic Encoding Rules (BER) • Canonical Encoding Rules (CER) • Distinguished Encoding Rules (DER) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Public Key Infrastructure (PKI) • Important management tool for the use of: • Digital certificates: • Asymmetric cryptography • Important to understand PKI • How it is managed • How key management is performed • Know PKI trust models © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 What is Public Key Infrastructure (PKI)? • There is a need for a consistent means to manage digital certificates • Public key infrastructure (PKI) - a framework for all entities involved in digital certificates • Certificate management actions facilitated by PKI • Create • Store • Distribute • Revoke © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Trust Models • Trust • Confidence in or reliance on another person or entity • Trust model • Refers to the type of trust relationship that can exist between individuals and entities • Direct trust • A type of trust model where one person knows the other person • Third-party trust • Two individuals trust each other because each trusts a third party © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Hierarchical Trust Model (1 of 2) • Hierarchical Trust Model • Assigns a single hierarchy with one master CA called the root • The root signs all digital certificate authorities with a single key • Can be used in an organization where one CA is responsible for only that organization’s digital certificates • Hierarchical trust model limitations: • A single CA private key may be compromised rendering all certificates worthless • Having a single CA who must verify and sign all digital certificates may create a significant backlog © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Hierarchical Trust Model (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 Distributed Trust Model • Distributed Trust Model • Multiple CAs sign digital certificates • Eliminates limitations of hierarchical trust model © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 Bridge Trust Model (1 of 2) • Bridge Trust Model • One CA acts as facilitator to interconnect connect all other CAs • Facilitator CA does not issue digital certificates, instead it acts as hub between hierarchical and distributed trust model • Allows the different models to be linked © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Bridge Trust Model (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 Managing PKI (1 of 2) • Certificate Policy (CP) • A published set of rules that govern operation of a PKI • Provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components • Certificate Practice Statement (CPS) • A technical document that describes in detail how the CA uses and manages certificates • Also covers how to register for a digital certificate, how to issue them, when to revoke them, procedural controls and key pair management © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Managing PKI (2 of 2) • Certificate life cycle • Creation -Occurs after user is positively identified • Suspension -May occur when employee on leave of absence • Revocation -Certificate no longer valid • Expiration -Key can no longer be used © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Key Management • Key Management includes: • Key storage • Key usage • Key handling procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 45. 45 Key Storage • Means of public key storage • Embedding within digital certificates • Means of private key storage • Stored on user’s local system • Software-based storage may expose keys to attackers • Alternative: storing keys in hardware • Smart-cards • Tokens © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 46. 46 Key Usage • Multiple pairs of dual keys can be created • If more security is needed than a single set of public/private keys • One pair used to encrypt information -Public key backed up in another location • Second pair used only for digital signatures -Public key in that pair would never be backed up © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 47. 47 Key Handling Procedures (1 of 3) • Key escrow • Keys are managed by a third party, such as a trusted CA • Private key is split and each half is encrypted • Two halves sent to third party, which stores each half in separate location • User can retrieve and combine two halves and use this new copy of private key for decryption • Expiration • Keys expire after a set period of time • Renewal • Existing key can be renewed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 48. 48 Key Handling Procedures (2 of 3) • Revocation • Keys may be revoked prior to its expiration date • Revoked keys may not be reinstated • Recovery • Need to recover keys of an employee hospitalized for extended period • Key recovery agent (KRA) may be used • Group of people may be used (M-of-N control) • Suspension • Suspended for a set period of time and then reinstated • Destruction • Removes all public and private keys and user’s identification from the CA © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 49. 49 Key Handling Procedures (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 50. 50 Cryptographic Transport Protocols • Most common cryptographic transport algorithms: • Secure Sockets Layer • Transport Layer Security • Secure Shell • Hypertext Transport Protocol Secure • S/MIME • Secure Real-time Transport Protocol • IP Security © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 51. 51 Secure Sockets Layer (SSL) • Secure Sockets Layer (SSL) • One of the most common transport algorithms • Developed by Netscape • Design goal was to create an encrypted data path between a client and a server • Uses the Advanced Encryption Standard (AES) • SSL version 3.0 is the current version © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 52. 52 Transport Layer Security (TLS) • Transport Layer Security (TLS) • SSL v3.0 served as the basis for TLS v1.0 • Versions starting with v1.1 are significantly more secure than SSL v3.0 • Current version is TLS v1.2 • Cipher suite • A named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS • Length of keys - a factor in determining the overall security of a transmission • Keys of less than 2048 bits are considered weak • Keys of 2048 bits are considered good • Keys of 4096 bits are strong © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 53. 53 Secure Shell (SSH) • An encrypted alternative to the Telnet protocol used to access remote computers • It is a Linux/UNIX-based command interface and protocol • SSH is a suite of three utilities: slogin, ssh, and scp • Client and server ends of the connection are authenticated using a digital certificate and passwords are encrypted • Can be used as a tool for secure network backups © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 54. 54 Hypertext Transport Protocol Secure (HTTPS) • A common use of TLS and SSL: • To secure Hypertext Transport Protocol (HTTP) communications between browser and Web server • The secure version is actually “plain” HTTP sent over SSL or TLS • Called Hypertext Transport Protocol Secure (HTTPS) and uses port 443 instead of HTTP’s port 80 • Users must enter URL s with https:// © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 55. 55 Secure/Multipurpose Internet Mail Extensions (S/MIME) • Secure/Multipurpose Internet Mail Extensions (S/MIME) • A protocol for securing email messages • Allows users to send encrypted messages that are also digitally signed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 56. 56 Secure Real-time Transport Protocol (SRTP) • Secure Real-time Transport Protocol (SRTP) • A secure extension protecting transmission using the Real-time Transport Protocol (RTP) • SRTP provides protection for Voice over IP (VoIP) communications • Adds security features such as message authentication and confidentiality for VoIP Communications © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 57. 57 IP Security (IPsec) • IPsec is considered to be a transparent security protocol • Transparent to applications, users, and software • IPsec provides three areas of protection that correspond to three IPsec protocols: • Authentication • Confidentiality • Key management • Supports two encryption modes: • Transport - encrypts only the data portion of each packet and leaves the header unencrypted • Tunnel - encrypts both the header and the data portion © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 58. 58 Chapter Summary (1 of 2) • Cryptography that is improperly applied can lead to vulnerabilities that will be exploited • A digital certificate is the user’s public key that has been digitally signed by a trusted third party who verifies the owner and that the public key belongs to that owner • A certificate repository (CR) is a list of approved digital certificates • Revoked digital certificates are listed in a Certificate Revocation List (RCL) • Status can also be checked through the Online Certificate Status Protocol (OCSP) • There are several different types of digital certificates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 59. 59 Chapter Summary (2 of 2) • Domain validation digital certificates verify the identity of the entity that has control over the domain name but indicate nothing regarding the trustworthiness of the individuals behind the site • A public key infrastructure (PKI) is a framework for all the entities involved in digital certificates to create, store, distribute, and revoke digital certificates • An organization that uses multiple digital certificates on a regular basis needs to properly manage those digital certificates • Cryptography is commonly used to protect data-in-transit • SSL and TLS are widely used protocols • IPsec is a set of protocols developed to support the secure exchange of packets © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.