Submit Search
Upload
CCNA Security Cryptography Systems
•
Download as PPTX, PDF
•
0 likes
•
57 views
AI-enhanced title
S
SalmenHAJJI1
Follow
CCNA security chapitre 7
Read less
Read more
Internet
Report
Share
Report
Share
1 of 88
Download now
Recommended
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
Ccna sv2 instructor_ppt_ch5
Ccna sv2 instructor_ppt_ch5
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
SalmenHAJJI1
Ccna security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3
SalmenHAJJI1
Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10
SalmenHAJJI1
Recommended
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
Ccna sv2 instructor_ppt_ch5
Ccna sv2 instructor_ppt_ch5
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
SalmenHAJJI1
Ccna security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3
SalmenHAJJI1
Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch4
Ccna sv2 instructor_ppt_ch4
SalmenHAJJI1
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
Babaa Naya
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Yuichi Ito
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
Diego Kreutz
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Yudi Arijanto
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
Alfredo Boiero Sanders
Icnd210 s04l02
Icnd210 s04l02
computerlenguyen
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Oscar Romano
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TWD Industries AG
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
Cisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
Sergey Gordeychik
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
Cisco Canada
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
Priyanka Aash
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
MarketingArrowECS_CZ
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
SalmenHAJJI1
More Related Content
What's hot
Ccna sv2 instructor_ppt_ch4
Ccna sv2 instructor_ppt_ch4
SalmenHAJJI1
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
Babaa Naya
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Yuichi Ito
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
Diego Kreutz
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Yudi Arijanto
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
Alfredo Boiero Sanders
Icnd210 s04l02
Icnd210 s04l02
computerlenguyen
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Oscar Romano
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TWD Industries AG
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
Cisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
Sergey Gordeychik
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
Cisco Canada
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
Priyanka Aash
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
MarketingArrowECS_CZ
What's hot
(20)
Ccna sv2 instructor_ppt_ch4
Ccna sv2 instructor_ppt_ch4
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
Icnd210 s04l02
Icnd210 s04l02
CCNP Security-Secure
CCNP Security-Secure
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Cisco ASA Firepower
Cisco ASA Firepower
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Similar to CCNA Security Cryptography Systems
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
SalmenHAJJI1
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
SalmenHAJJI1
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
newbie2019
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
newbie2019
Chapter 4 Network Access
Chapter 4 Network Access
newbie2019
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
RichardChecca1
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
newbie2019
Internet of everything
Internet of everything
Jayesh Pai
Internet of everything
Internet of everything
Wg Cdr Jayesh C S PAI
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
mohamedabdelwahed68
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Cisco Canada
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
newbie2019
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
newbie2019
Experiencias aumentadas por la red
Experiencias aumentadas por la red
schangan1
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
newbie2019
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
MITRE ATT&CK
Corporate Visions Conference
Corporate Visions Conference
Thierry van Herwijnen
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Corporate Visions
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Emily Murphy
Similar to CCNA Security Cryptography Systems
(20)
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
Chapter 4 Network Access
Chapter 4 Network Access
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
Internet of everything
Internet of everything
Internet of everything
Internet of everything
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
Experiencias aumentadas por la red
Experiencias aumentadas por la red
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
Corporate Visions Conference
Corporate Visions Conference
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Recently uploaded
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
aditipandeya
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Damian Radcliffe
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
girls4nights
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Call girls in Ahmedabad High profile
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
vipmodelshub1
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Delhi Call girls
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
babeytanya
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
divyansh0kumar0
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Dana Luther
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
stephieert
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
rahman018755
Recently uploaded
(20)
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
CCNA Security Cryptography Systems
1.
CCNA Security v2.0 Chapter
7: Cryptographic Systems
2.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 2 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary
3.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain the requirements of secure communications including integrity, authentication, and confidentiality. • Explain cryptography. • Describe cryptoanalysis. • Describe cryptology.
4.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 4
5.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 5
6.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 6
7.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 7
8.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 8
9.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 9
10.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 10 Ciphertext can be creating using several methods: • Transposition • Substitution • One-time pad
11.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 11
12.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 12 xxxx
13.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 13
14.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 14
15.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 15
16.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 16 Methods used for cryptanalysis: • Brute-force method • Ciphertext method • Known-Plaintext method • Chosen-Plaintext method • Chosen-Ciphertext method • Meet-in-the-Middle method
17.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 17 Frequency Analysis of the English Alphabet Deciphering Using Frequency Analysis
18.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 18
19.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 19
20.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 20
21.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 21
22.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 22 Upon completion of the section, you should be able to: • Describe the purpose of cryptographic hashes. • Explain how MD5 and SHA-1 are used to secure data communications. • Describe authenticity with HMAC. • Describe the components of key management.
23.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 23
24.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 24
25.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 25
26.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 26
27.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 27
28.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 28
29.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 29
30.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 30
31.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 31
32.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 32
33.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 33
34.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 34
35.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 35
36.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 36
37.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 37
38.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 38
39.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 39 Types of cryptographic keys: • Symmetric keys • Asymmetric keys • Digital signatures • Hash keys
40.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 40
41.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 41 Upon completion of the section, you should be able to: • Explain how encryption algorithms provide confidentiality. • Explain the function of the DES, 3DES, and the AES algorithms . • Describe the function of the Software Encrypted Algorithm (SEAL) and the Rivest ciphers (RC) algorithms.
42.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 42
43.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 43
44.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 44
45.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 45
46.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 46
47.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 47
48.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 48
49.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 49
50.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 50
51.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 51
52.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 52
53.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 53
54.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 54
55.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 55
56.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 56 SEAL has several restrictions: • The Cisco router and the peer must support IPsec. • The Cisco router and the other peer must run an IOS image that supports encryption. • The router and the peer must not have hardware IPsec encryption.
57.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 57
58.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 58
59.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 59
60.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 60
61.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 61 Upon completion of the section, you should be able to: • Explain the differences between symmetric and asymmetric encryptions and their intended applications. • Explain the functionality of digital signatures. • Explain the principles of a public key infrastructure (PKI).
62.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 62
63.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 63 Four protocols that use asymmetric key algorithms: • Internet Key Exchange (IKE) • Secure Socket Layer (SSL) • Secure Shell (SSH) • Pretty Good Privacy (PGP)
64.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 64
65.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 65
66.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 66 P Fi G st Alice Encrypts Message Using Bob’s Public Key Alice Encrypts A Hash Using Bob’s Public Key
67.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 67 Bob Uses Alice’s Public Key to Decrypt Hash Bob Uses His Public Key to Decrypt Message
68.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 68
69.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 69
70.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 70 Digital Signature Properties: • Signature is authentic • Signature is unalterable • Signature is not reusable • Signature cannot be repudiated
71.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 71 Digitally signing code provides several assurances about the code: • The code is authentic and is actually sourced by the publisher. • The code has not been modified since it left the software publisher. • The publisher undeniably published the code.
72.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 72
73.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 73 Sending a Digital Certificate Receiving a Digital Certificate
74.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 74 DSA Scorecard RSA Scorecard
75.
Cisco Public© 2013
Cisco and/or its affiliates. All rights reserved. 75
76.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 76
77.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 77 PKI Example Elements of the PKI Framework
78.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 78
79.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 79
80.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 80
81.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 81
82.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 82 Hierarchical CA Cross Certified CA Single-Root PKI Topology
83.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 83
84.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 84 Retrieving CA Certificates Submitting Certificate Requests to the CA
85.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 85 Peers Authenticate Each Other
86.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 86 Chapter Objectives: • Explain the areas of cryptology. • Explain to two kinds of encryption algorithms.
87.
Thank you.
88.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Public 88 • Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) • These resources cover a variety of topics including navigation, assessments, and assignments. • A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2
Editor's Notes
7.1.1.1 Authentication, Integrity, and Confidentiality
7.1.1.2 Authentication
7.1.1.3 Data Integrity
7.1.1.4 Data Confidentiality 7.1.1.5 Activity – Identify the Secure Communication Objective
7.1.2.1 Creating Ciphertext
7.1.2.2 Transposition Ciphers
7.1.2.3 Substitution Ciphers 7.1.2.4 Substitution Ciphers (Cont.)
7.1.2.5 One-Time Pad Ciphers
7.1.3.1 Cracking Code
7.1.3.2 Methods for Cracking Code
7.1.3.3 Cracking Code Example
7.1.4.1 Making and Breaking Secret Codes
7.1.4.2 Cryptanalysis
7.1.4.3 The Secret is in the Keys 7.1.4.4 Activity – Identify the Cryptology Terminology
7.2.1.1 Cryptographic Hash Function
7.2.1.2 Cryptographic Hash Function Properties
7.2.1.3 Well-Known Hash Functions
7.2.2.1 Message Digest 5 Algorithm
7.2.2.2 Secure Hash Algorithm
7.2.2.3 MD5 Versus SHA
7.2.3.1 Keyed-Hash Message Authentication Code
7.2.3.2 HMAC Operation
7.2.3.3 Hashing in Cisco Products
7.2.4.1 Characteristics of Key Management
7.2.4.2 Key Size and Keyspace
7.2.4.3 The Keyspace
7.2.4.4 Types of Cryptographic Keys
7.2.4.5 Choosing Cryptographic Keys 7.2.4.6 Activity – Identify the Characteristics of Key Management
7.3.1.1 Two Classes of Encryption Algorithms
7.3.1.2 Symmetric and Asymmetric Encryption
7.3.1.3 Symmetric Encryption
7.3.1.4 Symmetric Block Ciphers and Stream Ciphers
7.3.1.5 Choosing an Encryption Algorithm 7.3.1.6 Activity – Compare Symmetric and Asymmetric Encryption Algorithms
7.3.2.1 DES Symmetric Encryption
7.3.2.2 DES Summary
7.3.2.3 Improving DES with 3DES
7.3.2.4 3DES Operation
7.3.2.5 AES Origins
7.3.2.6 AES Summary
7.3.3.1 Software-Optimized Encryption Algorithm (SEAL)
7.3.3.2 RC Algorithms
7.3.4.1 Diffie-Hellman (DH) Algorithm
7.3.4.2 DH Operation 7.3.4.3 Activity – Identify the Steps of the DH Process
7.4.1.1 Asymmetric Key Algorithms
7.4.1.2 Public Key + Private Key = Confidentiality
7.4.1.3 Private Key + Public Key = Authenticity
7.4.1.4 Asymmetric Algorithms
7.4.1.4 Asymmetric Algorithms (Cont.)
7.4.1.5 Types of Asymmetric Algorithms 7.4.1.6 Activity – Identify the Key Types Required to Provide Authenticity and Confidentiality
7.4.2.1 Using Digital Signatures
7.4.2.2 Code Signing
7.4.2.3 Digital Certificates
7.4.2.4 Using Digital Certificates
7.4.2.5 Digital Signature Algorithms 7.4.2.6 Activity – Compare Code Signing and Digital Certificates
7.4.3.1 Public Key Infrastructure Overview
7.4.3.2 PKI Framework
7.4.3.3 Certificate Authorities
7.4.3.4 Interoperability of Different PKI Vendors
7.4.3.5 Public-Key Cryptography Standards
7.4.3.6 Simple Certificate Enrollment Protocol
7.4.3.7 PKI Topologies
7.4.3.8 Registration Authority
7.4.3.9 Digital Certificates and CAs
7.4.3.9 Digital Certificates and CAs (Cont.) 7.4.3.10 Activity – Identify Elements of the PKI Framework
7.5.1.1 Video Demonstration – Wireshark Packet Sniffing Usernames, Password, and Web Pages 7.5.1.2 Lab – Exploring Encryption Methods 7.5.1.3 Summary
https://www.netacad.com
Download now