SlideShare a Scribd company logo
Cryptography Basics

Yulian Slobodyan
December 2008
Presentation Path
 Introduction
 Symmetric Cryptography
 Asymmetric Cryptography
 Certificates and Key Management
 Email Security
 Network Protocols Security
 Technical Choices
 Questions
 Appendix

2
Introduction
Introduction>Cryptography for Security
Confidentiality
 Encryption/Decryption

Integrity
 Hashing
 Keyed Hashing or MAC (Message
Authentication Code)
 Digital Signatures

Authentication
 Keyed Hashing or MAC (Message
Authentication Code)
 Digital Signatures
 Hashing

Non-Repudiation
 Digital Signatures

4
Introduction>Basic Terms
 Encryption/Decryption
 Plain Text
 Cipher Text
 Cipher
 Key

5
Introduction>Cryptography Flavors
 Symmetric Cryptography
 Synonyms: Private Key, Secret Key, Shared Key, One Key, Single Key

 Asymmetric Cryptography
 Synonyms: Public Key

6
Symmetric Cryptography
Symmetric Cryptography

Block ciphers

Stream ciphers
Other
Cryptographic hash functions (Hashing)
MAC - Message Authentication Codes (Keyed Hashing)
8
Symmetric Cryptography>Block Ciphers

9
Symmetric Cryptography>Block Ciphers
 DES (Data Encryption Standard)
 56 bit key size
 Secure? NO!

 3DES (Triple DES)
 56-bit key size. 1 or 2 or 3 keys used. Max: 168 bits
 Secure? ALMOST (using 3 different keys)

 AES (Advanced Encryption Standard) or Rijndael [rɛindal]
 128/192/256 bit key size
 Secure? 128 bit – for dynamic data, 192 bit – ALMOST, 256 – YES (Currently)
 6 times faster than 3DES !!!

 RC2
 Variable key size
 Secure? Vulnerable to related key attack using 2^34 chosen plaintexts

10
Symmetric Cryptography>Stream Ciphers
 RC4
 Variable key size (typically 40-256 bit)

 eSTREAM Portfolio
 HC-256 (256 bit key size)
 Rabbit (128 bit key size)
 Salsa20 (256 bit key size)
 SOSEMANUK (128-256 bit key size, use 128)

11
Symmetric Cryptography>Hash Functions
 The ideal hash function properties:
 easy to compute the hash for any given data
 extremely difficult to construct a text that has a given
hash
 extremely difficult to modify a given text without changing
its hash
 extremely unlikely that two different messages will have
the same hash

 SHA-1 (160 bit)
 MD5 (128 bit)
 SHA-2 (SHA-256/224, SHA-512/384)
 SHA-3 (In development)

SHA-1
fox:
the quick red fox:
the quick red box:

ff0f0a8b656f0b44c26933acd2e367b6c1211290
0fa561fd7e9cf714d5f94c422106ec8979c0c147
a6b613310c301411300cc742ac5bf205728b78cb
12
Symmetric Cryptography>MAC Algorithms

 MAC – Message Authentication Code
 UMAC (AES)
 HMAC (MD5 or SHA-1)
 CMAC (AES)
13
Symmetric Cryptography>Pros and Cons

 Speed

 Key Management

14
Symmetric Cryptography>Dev Choices
 Encryption/Decryption – AES
 192 bit key – volatile data
 256 bit key – sensitive data

 Hashing
 MD5 – integrity checks
 SHA-256 – password hashing

 MAC
 HMAC, UMAC

 CHANGE PRIVATE KEYS REGULARLY!!!

15
Asymmetric Cryptography
Asymmetric Cryptography

 Public Key Encryption
 Digital Signatures
 Public Key Certificates

17
Asymmetric Cryptography>Encryption

 RSA
 Diffie-Hellman key exchange
 ECC (Elliptic Curve Cryptography) (Elliptic curve: y2 = x3 + ax + b )
18
Asymmetric Cryptography>Digital Signing

 DSA (Digital Signature Algorithm)
 RSA
 ECDSA (Elliptic Curve DSA)
19
Asymmetric Cryptography>Pros and Cons

 No Shared Secret

 Speed

20
Asymmetric Cryptography>Dev Choices
 Encryption - RSA
 1024 bit key – volatile data
 2048 bit key - sensitive data

 Digital Signing – DSA
 2048 bit key – beyond 2010
 3072 bit key – beyond 2030

 MANDATORY PUBLIC KEY INFRASTRUCTURE!!!

21
Certificates and Key Management
Key Management
 Key Management
 generation
 exchange
 storage
 safeguarding
 use
 vetting
 replacement

 Flavors
 PKI (Public Key Infrastructure)

 X.509
 Web Of Trust

 PGP

23
Key Management>Digital Certificate

 X.509
 PGP (Pretty Good Privacy)

24
Key Management>PKI

25
Asymmetric Cryptography>Web Of Trust

26
Email Security
Email Security

 ESMTP
 S/MIME
 OpenPGP
28
Email Security>Extended SMTP
 SMTP security extensions
 SMTP-AUTH
 STARTTLS

29
Email Security>S/MIME and OpenPGP
Mandatory features

S/MIME v3

OpenPGP

Message format

Binary, based on CMS

Binary, based on previous PGP

Certificate format

Binary, based on X.509v3

Binary, based on previous PGP

Symmetric encryption
algorithm

TripleDES (DES EDE3 CBC)

TripleDES (DES EDE3 Eccentric
CFB)

Signature algorithm

Diffie-Hellman (X9.42) with
DSS or RSA

ElGamal with DSS

Hash algorithm

SHA-1

SHA-1

MIME encapsulation of
signed data

Choice of multipart/signed or
CMS format

multipart/signed with ASCII
armor

MIME encapsulation of
encrypted data

application/pkcs7-mime

multipart/encrypted

30
Network Cryptographic Protocols
Cryptographic Protocols
 IPSec
 Kerberos
 NTLM
 TLS/SSL
 SSH

32
Cryptography Technical Choices
Cryptography Technical Choices
 Use a hash when you want a way of verifying that data has not been
tampered with in transit.
 Use a keyed hash when you want to prove that an entity knows a secret
without sending the secret back and forth, or you want to defend against
interception during transit by using a simple hash.
 Use encryption when you want to hide data when being sent across an insecure
medium or when making the data persistent.
 Use a certificate when you want to verify the person claiming to be the owner
of the public key.
 Use symmetric encryption for speed and when both parties share the key in
advance.
 Use asymmetric encryption when you want to safely exchange data across an
insecure medium.
 Use a digital signature when you want authentication and non-repudiation.
 Use a salt value (a cryptographically generated random number) to defend
against dictionary attacks.
34
Questions…
Appendix
Appendix>Cryptography Map

37
Appendix>References and Resources
 Wikipedia
 Information Security
 Network Security
 Cryptography

 SANS Software Security Institute
 Application Security Resources

 Research Library

 Microsoft Patterns & Practices
 Security Guidance

 Michael Howard's Web Log
 J.D. Meier's Blog

 OWASP

38

More Related Content

What's hot

MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Network Security(MD5)
Network Security(MD5)Network Security(MD5)
Network Security(MD5)
United International University
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing FunctionsYusuf Uzun
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3koolkampus
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography Ashik
Ashik Iqbal
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
Hussain Almohammadi
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityChhatra Thapa
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Emprovise
 
Hash function
Hash functionHash function
Hash function
Harry Potter
 
The Double Ratchet Algorithm
The Double Ratchet AlgorithmThe Double Ratchet Algorithm
SSL Primer
SSL PrimerSSL Primer
SSL Primer
Mahadev Gaonkar
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
ShrikantSharma86
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets
 

What's hot (20)

MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Network Security(MD5)
Network Security(MD5)Network Security(MD5)
Network Security(MD5)
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography Ashik
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Hash function
Hash functionHash function
Hash function
 
The Double Ratchet Algorithm
The Double Ratchet AlgorithmThe Double Ratchet Algorithm
The Double Ratchet Algorithm
 
SSL Primer
SSL PrimerSSL Primer
SSL Primer
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 

Viewers also liked

Apache Commons Overview
Apache Commons OverviewApache Commons Overview
Apache Commons Overview
ghessler
 
Eliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the InternetEliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the Internet
OwaspCzech
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-Baljit Saini
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
Kenny Ong
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashingRafi Dar
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
adil raja
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
Saurabh Kumar
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
Manesh T
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
shashi712
 

Viewers also liked (20)

Apache Commons Overview
Apache Commons OverviewApache Commons Overview
Apache Commons Overview
 
Eliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the InternetEliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the Internet
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-
 
it act
it actit act
it act
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashing
 
Ch17 Hashing
Ch17 HashingCh17 Hashing
Ch17 Hashing
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

Similar to Security Training: #2 Cryptography Basics

Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
Moein
MoeinMoein
IPSEC
IPSECIPSEC
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
Svetlin Nakov
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
OWASP
 
Basic Security in Routing and Switching
Basic Security in Routing and SwitchingBasic Security in Routing and Switching
Basic Security in Routing and Switching
Reza Farahani
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
 
Applied cryptanalysis - everything else
Applied cryptanalysis - everything elseApplied cryptanalysis - everything else
Applied cryptanalysis - everything else
Vlad Garbuz
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
Nate Lawson
 
Cryptography
CryptographyCryptography
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Young Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Tony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Luis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Fraboni Ec
 
Hashing
HashingHashing
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 

Similar to Security Training: #2 Cryptography Basics (20)

Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Moein
MoeinMoein
Moein
 
IPSEC
IPSECIPSEC
IPSEC
 
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
 
Basic Security in Routing and Switching
Basic Security in Routing and SwitchingBasic Security in Routing and Switching
Basic Security in Routing and Switching
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Applied cryptanalysis - everything else
Applied cryptanalysis - everything elseApplied cryptanalysis - everything else
Applied cryptanalysis - everything else
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Hashing
HashingHashing
Hashing
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

More from Yulian Slobodyan

Containerization - The DevOps Revolution
Containerization - The DevOps RevolutionContainerization - The DevOps Revolution
Containerization - The DevOps RevolutionYulian Slobodyan
 
IoT, Demystified
IoT, DemystifiedIoT, Demystified
IoT, Demystified
Yulian Slobodyan
 
Mono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationMono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationYulian Slobodyan
 
Security Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesSecurity Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesYulian Slobodyan
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
eBiz#3: CEP
eBiz#3: CEPeBiz#3: CEP
eBiz#3: CEP
Yulian Slobodyan
 
StreamInsight Breakthrough
StreamInsight BreakthroughStreamInsight Breakthrough
StreamInsight Breakthrough
Yulian Slobodyan
 

More from Yulian Slobodyan (10)

Containerization - The DevOps Revolution
Containerization - The DevOps RevolutionContainerization - The DevOps Revolution
Containerization - The DevOps Revolution
 
Slides Saturn-final
Slides Saturn-finalSlides Saturn-final
Slides Saturn-final
 
IoT, Demystified
IoT, DemystifiedIoT, Demystified
IoT, Demystified
 
Amazon Cloud Overview
Amazon Cloud OverviewAmazon Cloud Overview
Amazon Cloud Overview
 
Mono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationMono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR Implementation
 
Security Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesSecurity Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security Issues
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
.NET Micro Framework
.NET Micro Framework.NET Micro Framework
.NET Micro Framework
 
eBiz#3: CEP
eBiz#3: CEPeBiz#3: CEP
eBiz#3: CEP
 
StreamInsight Breakthrough
StreamInsight BreakthroughStreamInsight Breakthrough
StreamInsight Breakthrough
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Security Training: #2 Cryptography Basics

  • 2. Presentation Path  Introduction  Symmetric Cryptography  Asymmetric Cryptography  Certificates and Key Management  Email Security  Network Protocols Security  Technical Choices  Questions  Appendix 2
  • 4. Introduction>Cryptography for Security Confidentiality  Encryption/Decryption Integrity  Hashing  Keyed Hashing or MAC (Message Authentication Code)  Digital Signatures Authentication  Keyed Hashing or MAC (Message Authentication Code)  Digital Signatures  Hashing Non-Repudiation  Digital Signatures 4
  • 5. Introduction>Basic Terms  Encryption/Decryption  Plain Text  Cipher Text  Cipher  Key 5
  • 6. Introduction>Cryptography Flavors  Symmetric Cryptography  Synonyms: Private Key, Secret Key, Shared Key, One Key, Single Key  Asymmetric Cryptography  Synonyms: Public Key 6
  • 8. Symmetric Cryptography Block ciphers Stream ciphers Other Cryptographic hash functions (Hashing) MAC - Message Authentication Codes (Keyed Hashing) 8
  • 10. Symmetric Cryptography>Block Ciphers  DES (Data Encryption Standard)  56 bit key size  Secure? NO!  3DES (Triple DES)  56-bit key size. 1 or 2 or 3 keys used. Max: 168 bits  Secure? ALMOST (using 3 different keys)  AES (Advanced Encryption Standard) or Rijndael [rɛindal]  128/192/256 bit key size  Secure? 128 bit – for dynamic data, 192 bit – ALMOST, 256 – YES (Currently)  6 times faster than 3DES !!!  RC2  Variable key size  Secure? Vulnerable to related key attack using 2^34 chosen plaintexts 10
  • 11. Symmetric Cryptography>Stream Ciphers  RC4  Variable key size (typically 40-256 bit)  eSTREAM Portfolio  HC-256 (256 bit key size)  Rabbit (128 bit key size)  Salsa20 (256 bit key size)  SOSEMANUK (128-256 bit key size, use 128) 11
  • 12. Symmetric Cryptography>Hash Functions  The ideal hash function properties:  easy to compute the hash for any given data  extremely difficult to construct a text that has a given hash  extremely difficult to modify a given text without changing its hash  extremely unlikely that two different messages will have the same hash  SHA-1 (160 bit)  MD5 (128 bit)  SHA-2 (SHA-256/224, SHA-512/384)  SHA-3 (In development) SHA-1 fox: the quick red fox: the quick red box: ff0f0a8b656f0b44c26933acd2e367b6c1211290 0fa561fd7e9cf714d5f94c422106ec8979c0c147 a6b613310c301411300cc742ac5bf205728b78cb 12
  • 13. Symmetric Cryptography>MAC Algorithms  MAC – Message Authentication Code  UMAC (AES)  HMAC (MD5 or SHA-1)  CMAC (AES) 13
  • 14. Symmetric Cryptography>Pros and Cons  Speed  Key Management 14
  • 15. Symmetric Cryptography>Dev Choices  Encryption/Decryption – AES  192 bit key – volatile data  256 bit key – sensitive data  Hashing  MD5 – integrity checks  SHA-256 – password hashing  MAC  HMAC, UMAC  CHANGE PRIVATE KEYS REGULARLY!!! 15
  • 17. Asymmetric Cryptography  Public Key Encryption  Digital Signatures  Public Key Certificates 17
  • 18. Asymmetric Cryptography>Encryption  RSA  Diffie-Hellman key exchange  ECC (Elliptic Curve Cryptography) (Elliptic curve: y2 = x3 + ax + b ) 18
  • 19. Asymmetric Cryptography>Digital Signing  DSA (Digital Signature Algorithm)  RSA  ECDSA (Elliptic Curve DSA) 19
  • 20. Asymmetric Cryptography>Pros and Cons  No Shared Secret  Speed 20
  • 21. Asymmetric Cryptography>Dev Choices  Encryption - RSA  1024 bit key – volatile data  2048 bit key - sensitive data  Digital Signing – DSA  2048 bit key – beyond 2010  3072 bit key – beyond 2030  MANDATORY PUBLIC KEY INFRASTRUCTURE!!! 21
  • 22. Certificates and Key Management
  • 23. Key Management  Key Management  generation  exchange  storage  safeguarding  use  vetting  replacement  Flavors  PKI (Public Key Infrastructure)  X.509  Web Of Trust  PGP 23
  • 24. Key Management>Digital Certificate  X.509  PGP (Pretty Good Privacy) 24
  • 28. Email Security  ESMTP  S/MIME  OpenPGP 28
  • 29. Email Security>Extended SMTP  SMTP security extensions  SMTP-AUTH  STARTTLS 29
  • 30. Email Security>S/MIME and OpenPGP Mandatory features S/MIME v3 OpenPGP Message format Binary, based on CMS Binary, based on previous PGP Certificate format Binary, based on X.509v3 Binary, based on previous PGP Symmetric encryption algorithm TripleDES (DES EDE3 CBC) TripleDES (DES EDE3 Eccentric CFB) Signature algorithm Diffie-Hellman (X9.42) with DSS or RSA ElGamal with DSS Hash algorithm SHA-1 SHA-1 MIME encapsulation of signed data Choice of multipart/signed or CMS format multipart/signed with ASCII armor MIME encapsulation of encrypted data application/pkcs7-mime multipart/encrypted 30
  • 32. Cryptographic Protocols  IPSec  Kerberos  NTLM  TLS/SSL  SSH 32
  • 34. Cryptography Technical Choices  Use a hash when you want a way of verifying that data has not been tampered with in transit.  Use a keyed hash when you want to prove that an entity knows a secret without sending the secret back and forth, or you want to defend against interception during transit by using a simple hash.  Use encryption when you want to hide data when being sent across an insecure medium or when making the data persistent.  Use a certificate when you want to verify the person claiming to be the owner of the public key.  Use symmetric encryption for speed and when both parties share the key in advance.  Use asymmetric encryption when you want to safely exchange data across an insecure medium.  Use a digital signature when you want authentication and non-repudiation.  Use a salt value (a cryptographically generated random number) to defend against dictionary attacks. 34
  • 38. Appendix>References and Resources  Wikipedia  Information Security  Network Security  Cryptography  SANS Software Security Institute  Application Security Resources  Research Library  Microsoft Patterns & Practices  Security Guidance  Michael Howard's Web Log  J.D. Meier's Blog  OWASP 38