SlideShare a Scribd company logo
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 5
Basic Cryptography
© Cengage Learning 2015
Objectives
• Define cryptography
• Describe hash, symmetric, and asymmetric
cryptographic algorithms
• List the various ways in which cryptography is used
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
2
© Cengage Learning 2015
Defining Cryptography
• Defining cryptography involves:
– Understanding what it is
– Understanding what it can do
– Understanding how cryptography can be used as a
security tool to protect data
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
3
© Cengage Learning 2015
What is Cryptography?
• Cryptography
– Scrambling information so it cannot be read
– Transforms information into secure form so
unauthorized persons cannot access it
• Steganography
– Hides the existence of data
– An image, audio, or video file can contain hidden
messages embedded in the file
– Achieved by dividing data and hiding in unused
portions of the file
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
4
© Cengage Learning 2015
What is Cryptography?
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
5
© Cengage Learning 2015
What is Cryptography?
• Origins of cryptography
– Used by Julius Caesar
• Encryption
– Changing original text into a secret message using
cryptography
• Decryption
– Changing secret message back to original form
• Cleartext data
– Data stored or transmitted without encryption
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
6
© Cengage Learning 2015
What is Cryptography?
• Plaintext
– Cleartext data to be encrypted
• Plaintext data is input into a cryptographic
algorithm
– Consists of procedures based on a mathematical
formula used to encrypt and decrypt the data
• Key
– A mathematical value entered into the algorithm to
produce ciphertext (encrypted data)
– The reverse process uses the key to decrypt the
message
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
7
© Cengage Learning 2015
What is Cryptography?
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
8
© Cengage Learning 2015
Cryptography and Security
• Cryptography can provide five basic protections
– Confidentiality
• Ensures only authorized parties can view it
– Integrity
• Ensures information is correct and unaltered
– Availability
• Ensures authorized users can access it
– Authentication
• Ensures sender can be verified through cryptography
– Non-repudiation
• Proves that a user performed an action
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
9
© Cengage Learning 2015
Cryptography and Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
10
© Cengage Learning 2015
Cryptographic Algorithms
• A fundamental difference in cryptographic
algorithms is the amount of data processed at a
time
– Stream cipher - takes one character and replaces it
with another
– Block cipher - manipulates an entire block of
plaintext at one time
– Sponge function - takes as input a string of any
length and returns a string of any requested variable
length
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
11
© Cengage Learning 2015
Cryptographic Algorithms
• Three categories of cryptographic algorithms
– Hash algorithms
– Symmetric cryptographic algorithms
– Asymmetric cryptographic algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
12
© Cengage Learning 2015
Hash Algorithms
• Hash algorithms
– It is the most basic type of cryptographic algorithm
– Creates a unique “digital fingerprint” of a set of data
and is commonly called hashing
– This fingerprint, called a digest (sometimes called a
message digest or hash), represents the contents
– Its contents cannot be used to reveal original data
set
– Is primarily used for comparison purposes
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
13
© Cengage Learning 2015
Hash Algorithms
• Secure hashing algorithm characteristics:
– Fixed size
• Short and long data sets have the same size hash
– Unique
• Two different data sets cannot produce the same hash
– Original
• Data set cannot be created to have a predefined hash
– Secure
• Resulting hash cannot be reversed to determine
original plaintext
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
14
© Cengage Learning 2015
Hash Algorithm
• Hashing is used to determine the integrity of a
message or the contents of a file
• Hashed Message Authentication Code (HMAC)
– A hash variation providing improved security
– Uses a “shared secret key” possessed by sender
and receiver
– Receiver uses a key to decrypt the hash
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
15
© Cengage Learning 2015
Hash Algorithm
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
16
© Cengage Learning 2015
Hash Algorithm
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
17
© Cengage Learning 2015
Hash Algorithms
• Most common hash algorithms
– Message Digest
– Secure Hash Algorithm
– Whirlpool
– RIPEMD
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
18
© Cengage Learning 2015
Hash Algorithms
• Message Digest (MD)
– One of the most common one-way hash algorithms
– Three different versions
• Message Digest 2 (MD2)
– Takes plaintext of any length and creates 128 bit
hash
– Padding is added to make short messages 128 bits
– Considered too slow today and rarely used
• Message Digest 4 (MD4)
– Has flaws and was not widely accepted
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
19
© Cengage Learning 2015
Hash Algorithms
• Message Digest 5 (MD5)
– Designed to address MD4’s weaknesses
– Message length padded to 512 bits
– Weaknesses in compression function could lead to
collisions
– Some security experts recommend using a more
secure hash algorithm
• Secure Hash Algorithm (SHA)
– More secure than MD
– SHA-3 uses a sponge function instead of stream or
block ciphers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
20
© Cengage Learning 2015
Hash Algorithms
• Whirlpool
– A recent cryptographic hash function
– Adopted by standards organizations, including the
International Organization for Standardization (ISO)
– Creates a hash of 512 bits
• Race Integrity Primitives Evaluation Message
Digest (RIPEMD)
– The primary design feature is two different and
independent parallel chains of computation
– The results are combined at end of process
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
21
© Cengage Learning 2015
Hash Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
22
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
• Symmetric cryptographic algorithms - use the same
single key to encrypt and decrypt a document
– Original cryptographic algorithms were symmetric
– Also called private key cryptography (the key is kept
private between sender and receiver)
• Common algorithms include:
– Data Encryption Standard
– Triple Data Encryption Standard
– Advanced Encryption Standard
– Several other algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
23
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
24
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
25
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
• Data Encryption Standard (DES)
– Based on product originally designed in early 1970s
– Uses a 56-bit key and is a block cipher
• Triple Data Encryption standard (3DES)
– Designed to replace DES
– Uses three rounds of encryption
– Ciphertext of first round becomes input for second
iteration
– Most secure versions use different keys used for
each round
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
26
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
27
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
• Advanced Encryption Standard (AES)
– A symmetric cipher approved by the NIST in 2000 as
a replacement for DES
– Official encryption standard used by the U.S.
government
– Performs three steps on every block (128 bits) of
plaintext
– Designed to be secure well into the future
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
28
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
• Other Algorithms
– Rivest Cipher (RC)
• Family of cipher algorithms designed by Ron Rivest
– International Data Encryption Algorithm (IDEA)
• Used in European nations
• Block cipher processing 64 bits with a 128-bit key with
8 rounds
– Blowfish
• Block cipher operating on 64-bit blocks with key
lengths from 32-448 bits
• No significant weaknesses have been identified
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
29
© Cengage Learning 2015
Symmetric Cryptographic Algorithms
• Other Algorithms (cont’d)
– One-time pad (OTP)
• Creates a truly random key to combine with the
plaintext
• Considered the only known method to perform
encryption that cannot be broken mathematically
• A “pad” is a long sequence of random letters
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
30
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• Weakness of symmetric algorithms
– Distributing and maintaining a secure single key
among multiple users distributed geographically
• Asymmetric cryptographic algorithms
– Also known as public key cryptography
– Uses two mathematically related keys
– Public key available to everyone and freely
distributed
– Private key known only to individual to whom it
belongs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
31
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
32
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• Important principles
– Key pairs
– Public key
– Private key
– Both directions - keys can work in both directions
• Digital signature - an electronic verification
– Verifies the sender
– Prevents sender from disowning the message
– Proves message integrity
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
33
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
34
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
35
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• RSA
– Published in 1977 and patented by MIT in 1983
– Most common asymmetric cryptography algorithm
– Uses two large prime numbers
• Elliptic curve cryptography (ECC)
– Users share one elliptic curve and one point on the
curve
– Uses less computing power than prime number-
based asymmetric cryptography
• Key sizes are smaller
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
36
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
37
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• Quantum cryptography
– Exploits the properties of microscopic objects such
as photons
– Does not depend on difficult mathematical problems
• NTRUEncypt
– Uses lattice-based cryptography which relies on a
set of points in space
– Faster than RSA and ECC
– More resistant to quantum computing attacks
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
38
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
39
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• Quantum Cryptography
– Attempts to use the unusual and unique behavior of
microscopic objects to enable user to securely
develop and share keys
– Exploits the properties of microscopic objects such
as photons
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
40
© Cengage Learning 2015
Asymmetric Cryptographic Algorithms
• Key Exchange
– There are different solutions for a key exchange that
occurs within the normal communications channel
(in-band) of cryptography:
• Diffie-Hellman (DH)
• Diffie-Hellman Ephemeral (DHE)
• Elliptic Curve Diffie-Hellman (ECDH)
• Perfect forward secrecy
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
41
© Cengage Learning 2015
Using Cryptography
• Cryptography
– Should be used to secure data that needs to be
protected
– Can be applied through either software or hardware
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
42
© Cengage Learning 2015
Encryption Through Software
• File and File System Cryptography
– Encryption software can be used to encrypt or
decrypt files one-by-one
• Protecting groups of files through file system
cryptography can be performed using:
– Pretty Good Privacy (PGP)
• Widely used asymmetric cryptography system
• Used for files and e-mails on Windows systems
– GNU Privacy Guard (GPG)
• Runs on Windows, UNIX, and Linux operating
systems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
43
© Cengage Learning 2015
Encryption Through Software
• Microsoft Windows Encrypting File System (EFS)
– Cryptography system for Windows
– Uses NTFS file system
– Tightly integrated with the file system
– Encryption and decryption are transparent to the user
– Users can set encryption attribute for a file in the
Advanced Attributes dialog box
– Storing the file in a file folder set for encryption will
automatically encrypt the file
– Use the Cipher.exe command-line utility to encrypt files
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
44
© Cengage Learning 2015
Encryption Through Software
• Whole disk encryption
– Protects all data on a hard drive
– Example: BitLocker drive encryption software that is
included in Microsoft Windows
– BitLocker encrypts the entire system volume,
including the Windows Registry
– Prevents attackers from accessing data by booting
from another OS or placing the hard drive in another
computer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
45
© Cengage Learning 2015
Hardware Encryption
• Software encryption can be subject to attacks to
exploit its vulnerabilities
• Cryptography can be embedded in hardware
– Provides higher degree of security
– Can be applied to USB devices and standard hard
drives
• Hardware encryption options include:
– Trusted platform module
– Hardware security model
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
46
© Cengage Learning 2015
Hardware Encryption
• USB device encryption
– Encrypted hardware-based flash drives can be used
• Will not connect a computer until correct password
has been provided
• All data copied to the drive is automatically encrypted
• Tamper-resistant external cases
• Administrators can remotely control and track activity
on the devices
• Stolen drives can be remotely disabled
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
47
© Cengage Learning 2015
Hardware Encryption
• Hard disk drive encryption
– Self-encrypting hard disk drives protect all files
stored on them
– The drive and host device perform authentication
process during initial power up
– If authentication fails, the drive can be configured to
deny access or even delete encryption keys so all
data is permanently unreadable
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
48
© Cengage Learning 2015
Hardware Encryption
• Trusted Platform Module (TPM)
– A chip on a computer’s motherboard that provides
cryptographic services
– Includes a true random number generator
– Entirely done in hardware so it cannot be subject to
software attack
– Prevents computer from booting if files or data have
been altered
– Prompts for password if hard drive moved to a new
computer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
49
© Cengage Learning 2015
Hardware Encryption
• Hardware Security Module (HSM)
– A secure cryptographic processor
– Includes an onboard key generator and key storage
facility
– Performs accelerated symmetric and asymmetric
encryption
– Can provide services to multiple devices over a LAN
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
50
© Cengage Learning 2015
Summary
• Cryptography is the science of transforming
information into a secure form while being
transmitted or stored
• Hashing creates a unique digital fingerprint that
represents contents of original material
– Used only for comparison
• Symmetric cryptography uses a single key to
encrypt and decrypt a message
– Stream ciphers and block ciphers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
51
© Cengage Learning 2015
Summary
• Asymmetric cryptography
– Public key cryptography
– Uses two keys: public key and private key
• Cryptography can be applied through hardware or
software
• Hardware encryption cannot be exploited like
software cryptography
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
52

More Related Content

What's hot

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
Amy McMullin
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
Dr. Ahmed Al Zaidy
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
Infosec
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
 
Chapter 3 Basic Cryptography
Chapter 3 Basic CryptographyChapter 3 Basic Cryptography
Chapter 3 Basic Cryptography
Dr. Ahmed Al Zaidy
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
CNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionCNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated Encryption
Sam Bowne
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
Enrico Zimuel
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
Amy McMullin
 

What's hot (20)

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Chapter 3 Basic Cryptography
Chapter 3 Basic CryptographyChapter 3 Basic Cryptography
Chapter 3 Basic Cryptography
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
CNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionCNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated Encryption
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
The need for security
The need for securityThe need for security
The need for security
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 

Viewers also liked

Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
Amy McMullin
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Amy McMullin
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
Amy McMullin
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
Amy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
Amy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
Amy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
Amy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
Amy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
Amy McMullin
 
hacker culture
hacker culturehacker culture
hacker culture
Amy McMullin
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
Amy McMullin
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
primeteacher32
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
Amy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
Cengage Learning
 
Ch01
Ch01Ch01
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
stephen_jackson_Security+
stephen_jackson_Security+stephen_jackson_Security+
stephen_jackson_Security+
Stephen Jackson
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
sombat nirund
 

Viewers also liked (19)

Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
hacker culture
hacker culturehacker culture
hacker culture
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Ch01
Ch01Ch01
Ch01
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
stephen_jackson_Security+
stephen_jackson_Security+stephen_jackson_Security+
stephen_jackson_Security+
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 

Similar to Chapter 5 Presentation

Lesson 1
Lesson 1Lesson 1
Lesson 2
Lesson 2Lesson 2
Introduction to cryptography for software developers
Introduction to cryptography for software developersIntroduction to cryptography for software developers
Introduction to cryptography for software developers
Intopalo Digital Oy
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
kamalakantas
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
pooleavelina
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
D.Rajesh Kumar
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
FRSecure
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
mdhar123
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
ChaitanyaK65
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
mdhar123
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
Narudom Roongsiriwong, CISSP
 
Why “It’s over TLS” is not good enough
Why “It’s over TLS” is not good enoughWhy “It’s over TLS” is not good enough
Why “It’s over TLS” is not good enough
MatthewHooper22
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
Aruba, a Hewlett Packard Enterprise company
 

Similar to Chapter 5 Presentation (20)

Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Introduction to cryptography for software developers
Introduction to cryptography for software developersIntroduction to cryptography for software developers
Introduction to cryptography for software developers
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Why “It’s over TLS” is not good enough
Why “It’s over TLS” is not good enoughWhy “It’s over TLS” is not good enough
Why “It’s over TLS” is not good enough
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Chapter 5 Presentation

  • 1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 5 Basic Cryptography
  • 2. © Cengage Learning 2015 Objectives • Define cryptography • Describe hash, symmetric, and asymmetric cryptographic algorithms • List the various ways in which cryptography is used CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 2
  • 3. © Cengage Learning 2015 Defining Cryptography • Defining cryptography involves: – Understanding what it is – Understanding what it can do – Understanding how cryptography can be used as a security tool to protect data CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. © Cengage Learning 2015 What is Cryptography? • Cryptography – Scrambling information so it cannot be read – Transforms information into secure form so unauthorized persons cannot access it • Steganography – Hides the existence of data – An image, audio, or video file can contain hidden messages embedded in the file – Achieved by dividing data and hiding in unused portions of the file CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 What is Cryptography? CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 What is Cryptography? • Origins of cryptography – Used by Julius Caesar • Encryption – Changing original text into a secret message using cryptography • Decryption – Changing secret message back to original form • Cleartext data – Data stored or transmitted without encryption CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6
  • 7. © Cengage Learning 2015 What is Cryptography? • Plaintext – Cleartext data to be encrypted • Plaintext data is input into a cryptographic algorithm – Consists of procedures based on a mathematical formula used to encrypt and decrypt the data • Key – A mathematical value entered into the algorithm to produce ciphertext (encrypted data) – The reverse process uses the key to decrypt the message CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 What is Cryptography? CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Cryptography and Security • Cryptography can provide five basic protections – Confidentiality • Ensures only authorized parties can view it – Integrity • Ensures information is correct and unaltered – Availability • Ensures authorized users can access it – Authentication • Ensures sender can be verified through cryptography – Non-repudiation • Proves that a user performed an action CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 Cryptography and Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Cryptographic Algorithms • A fundamental difference in cryptographic algorithms is the amount of data processed at a time – Stream cipher - takes one character and replaces it with another – Block cipher - manipulates an entire block of plaintext at one time – Sponge function - takes as input a string of any length and returns a string of any requested variable length CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Cryptographic Algorithms • Three categories of cryptographic algorithms – Hash algorithms – Symmetric cryptographic algorithms – Asymmetric cryptographic algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Hash Algorithms • Hash algorithms – It is the most basic type of cryptographic algorithm – Creates a unique “digital fingerprint” of a set of data and is commonly called hashing – This fingerprint, called a digest (sometimes called a message digest or hash), represents the contents – Its contents cannot be used to reveal original data set – Is primarily used for comparison purposes CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Hash Algorithms • Secure hashing algorithm characteristics: – Fixed size • Short and long data sets have the same size hash – Unique • Two different data sets cannot produce the same hash – Original • Data set cannot be created to have a predefined hash – Secure • Resulting hash cannot be reversed to determine original plaintext CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Hash Algorithm • Hashing is used to determine the integrity of a message or the contents of a file • Hashed Message Authentication Code (HMAC) – A hash variation providing improved security – Uses a “shared secret key” possessed by sender and receiver – Receiver uses a key to decrypt the hash CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 Hash Algorithm CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 Hash Algorithm CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015 Hash Algorithms • Most common hash algorithms – Message Digest – Secure Hash Algorithm – Whirlpool – RIPEMD CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. © Cengage Learning 2015 Hash Algorithms • Message Digest (MD) – One of the most common one-way hash algorithms – Three different versions • Message Digest 2 (MD2) – Takes plaintext of any length and creates 128 bit hash – Padding is added to make short messages 128 bits – Considered too slow today and rarely used • Message Digest 4 (MD4) – Has flaws and was not widely accepted CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 Hash Algorithms • Message Digest 5 (MD5) – Designed to address MD4’s weaknesses – Message length padded to 512 bits – Weaknesses in compression function could lead to collisions – Some security experts recommend using a more secure hash algorithm • Secure Hash Algorithm (SHA) – More secure than MD – SHA-3 uses a sponge function instead of stream or block ciphers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Hash Algorithms • Whirlpool – A recent cryptographic hash function – Adopted by standards organizations, including the International Organization for Standardization (ISO) – Creates a hash of 512 bits • Race Integrity Primitives Evaluation Message Digest (RIPEMD) – The primary design feature is two different and independent parallel chains of computation – The results are combined at end of process CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Hash Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 Symmetric Cryptographic Algorithms • Symmetric cryptographic algorithms - use the same single key to encrypt and decrypt a document – Original cryptographic algorithms were symmetric – Also called private key cryptography (the key is kept private between sender and receiver) • Common algorithms include: – Data Encryption Standard – Triple Data Encryption Standard – Advanced Encryption Standard – Several other algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Symmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 Symmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 Symmetric Cryptographic Algorithms • Data Encryption Standard (DES) – Based on product originally designed in early 1970s – Uses a 56-bit key and is a block cipher • Triple Data Encryption standard (3DES) – Designed to replace DES – Uses three rounds of encryption – Ciphertext of first round becomes input for second iteration – Most secure versions use different keys used for each round CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 Symmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 Symmetric Cryptographic Algorithms • Advanced Encryption Standard (AES) – A symmetric cipher approved by the NIST in 2000 as a replacement for DES – Official encryption standard used by the U.S. government – Performs three steps on every block (128 bits) of plaintext – Designed to be secure well into the future CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Symmetric Cryptographic Algorithms • Other Algorithms – Rivest Cipher (RC) • Family of cipher algorithms designed by Ron Rivest – International Data Encryption Algorithm (IDEA) • Used in European nations • Block cipher processing 64 bits with a 128-bit key with 8 rounds – Blowfish • Block cipher operating on 64-bit blocks with key lengths from 32-448 bits • No significant weaknesses have been identified CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Symmetric Cryptographic Algorithms • Other Algorithms (cont’d) – One-time pad (OTP) • Creates a truly random key to combine with the plaintext • Considered the only known method to perform encryption that cannot be broken mathematically • A “pad” is a long sequence of random letters CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • Weakness of symmetric algorithms – Distributing and maintaining a secure single key among multiple users distributed geographically • Asymmetric cryptographic algorithms – Also known as public key cryptography – Uses two mathematically related keys – Public key available to everyone and freely distributed – Private key known only to individual to whom it belongs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • Important principles – Key pairs – Public key – Private key – Both directions - keys can work in both directions • Digital signature - an electronic verification – Verifies the sender – Prevents sender from disowning the message – Proves message integrity CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • RSA – Published in 1977 and patented by MIT in 1983 – Most common asymmetric cryptography algorithm – Uses two large prime numbers • Elliptic curve cryptography (ECC) – Users share one elliptic curve and one point on the curve – Uses less computing power than prime number- based asymmetric cryptography • Key sizes are smaller CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • Quantum cryptography – Exploits the properties of microscopic objects such as photons – Does not depend on difficult mathematical problems • NTRUEncypt – Uses lattice-based cryptography which relies on a set of points in space – Faster than RSA and ECC – More resistant to quantum computing attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • Quantum Cryptography – Attempts to use the unusual and unique behavior of microscopic objects to enable user to securely develop and share keys – Exploits the properties of microscopic objects such as photons CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Asymmetric Cryptographic Algorithms • Key Exchange – There are different solutions for a key exchange that occurs within the normal communications channel (in-band) of cryptography: • Diffie-Hellman (DH) • Diffie-Hellman Ephemeral (DHE) • Elliptic Curve Diffie-Hellman (ECDH) • Perfect forward secrecy CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. © Cengage Learning 2015 Using Cryptography • Cryptography – Should be used to secure data that needs to be protected – Can be applied through either software or hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015 Encryption Through Software • File and File System Cryptography – Encryption software can be used to encrypt or decrypt files one-by-one • Protecting groups of files through file system cryptography can be performed using: – Pretty Good Privacy (PGP) • Widely used asymmetric cryptography system • Used for files and e-mails on Windows systems – GNU Privacy Guard (GPG) • Runs on Windows, UNIX, and Linux operating systems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. © Cengage Learning 2015 Encryption Through Software • Microsoft Windows Encrypting File System (EFS) – Cryptography system for Windows – Uses NTFS file system – Tightly integrated with the file system – Encryption and decryption are transparent to the user – Users can set encryption attribute for a file in the Advanced Attributes dialog box – Storing the file in a file folder set for encryption will automatically encrypt the file – Use the Cipher.exe command-line utility to encrypt files CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Encryption Through Software • Whole disk encryption – Protects all data on a hard drive – Example: BitLocker drive encryption software that is included in Microsoft Windows – BitLocker encrypts the entire system volume, including the Windows Registry – Prevents attackers from accessing data by booting from another OS or placing the hard drive in another computer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Hardware Encryption • Software encryption can be subject to attacks to exploit its vulnerabilities • Cryptography can be embedded in hardware – Provides higher degree of security – Can be applied to USB devices and standard hard drives • Hardware encryption options include: – Trusted platform module – Hardware security model CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Hardware Encryption • USB device encryption – Encrypted hardware-based flash drives can be used • Will not connect a computer until correct password has been provided • All data copied to the drive is automatically encrypted • Tamper-resistant external cases • Administrators can remotely control and track activity on the devices • Stolen drives can be remotely disabled CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Hardware Encryption • Hard disk drive encryption – Self-encrypting hard disk drives protect all files stored on them – The drive and host device perform authentication process during initial power up – If authentication fails, the drive can be configured to deny access or even delete encryption keys so all data is permanently unreadable CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 Hardware Encryption • Trusted Platform Module (TPM) – A chip on a computer’s motherboard that provides cryptographic services – Includes a true random number generator – Entirely done in hardware so it cannot be subject to software attack – Prevents computer from booting if files or data have been altered – Prompts for password if hard drive moved to a new computer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 Hardware Encryption • Hardware Security Module (HSM) – A secure cryptographic processor – Includes an onboard key generator and key storage facility – Performs accelerated symmetric and asymmetric encryption – Can provide services to multiple devices over a LAN CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. © Cengage Learning 2015 Summary • Cryptography is the science of transforming information into a secure form while being transmitted or stored • Hashing creates a unique digital fingerprint that represents contents of original material – Used only for comparison • Symmetric cryptography uses a single key to encrypt and decrypt a message – Stream ciphers and block ciphers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. © Cengage Learning 2015 Summary • Asymmetric cryptography – Public key cryptography – Uses two keys: public key and private key • Cryptography can be applied through hardware or software • Hardware encryption cannot be exploited like software cryptography CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 52

Editor's Notes

  1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 5 Basic Cryptography
  2. Objectives Define cryptography Describe hash, symmetric, and asymmetric cryptographic algorithms List the various ways in which cryptography is used
  3. Defining Cryptography Defining cryptography involves: Understanding what it is Understanding what it can do Understanding how cryptography can be used as a security tool to protect data
  4. What is Cryptography? Cryptography Scrambling information so it cannot be read Transforms information into secure form so unauthorized persons cannot access it Steganography Hides the existence of data An image, audio, or video file can contain hidden messages embedded in the file Achieved by dividing data and hiding in unused portions of the file Cryptography Scrambling information so it cannot be read Transforms information into secure form so unauthorized persons cannot access it Steganography Hides the existence of data An image, audio, or video file can contain hidden messages embedded in the file Achieved by dividing data and hiding in unused portions of the file
  5. What is Cryptography? Figure 5-1 Data hidden by steganography
  6. What is Cryptography? Origins of cryptography Used by Julius Caesar Encryption Changing original text into a secret message using cryptography Decryption Changing secret message back to original form Cleartext data Data stored or transmitted without encryption
  7. What is Cryptography? Plaintext Cleartext data to be encrypted Plaintext data is input into a cryptographic algorithm Consists of procedures based on a mathematical formula used to encrypt and decrypt the data Key A mathematical value entered into the algorithm to produce ciphertext (encrypted data) The reverse process uses the key to decrypt the message
  8. What is Cryptography? Figure 5-2 Cryptographic process
  9. Cryptography and Security Cryptography can provide five basic protections Confidentiality Ensures only authorized parties can view it Integrity Ensures information is correct and unaltered Availability Ensures authorized users can access it Authentication Ensures sender can be verified through cryptography Non-repudiation Proves that a user performed an action
  10. Cryptography and Security Table 5-1 Information protections by cryptography
  11. Cryptographic Algorithms A fundamental difference in cryptographic algorithms is the amount of data processed at a time Stream cipher - takes one character and replaces it with another Block cipher - manipulates an entire block of plaintext at one time Sponge function - takes as input a string of any length and returns a string of any requested variable length
  12. Cryptographic Algorithms Three categories of cryptographic algorithms Hash algorithms Symmetric cryptographic algorithms Asymmetric cryptographic algorithms
  13. Hash Algorithms Hash algorithms It is the most basic type of cryptographic algorithm Creates a unique “digital fingerprint” of a set of data and is commonly called hashing This fingerprint, called a digest (sometimes called a message digest or hash), represents the contents Its contents cannot be used to reveal original data set Is primarily used for comparison purposes
  14. Hash Algorithms Secure hashing algorithm characteristics: Fixed size Short and long data sets have the same size hash Unique Two different data sets cannot produce the same hash Original Data set cannot be created to have a predefined hash Secure Resulting hash cannot be reversed to determine original plaintext
  15. Hash Algorithm Hashing is used to determine the integrity of a message or the contents of a file Hashed Message Authentication Code (HMAC) A hash variation providing improved security Uses a “shared secret key” possessed by sender and receiver Receiver uses a key to decrypt the hash
  16. Hash Algorithm Figure 5-5 Verifying file integrity with digests
  17. Hash Algorithm Table 5-2 Information protections by hashing cryptography
  18. Hash Algorithms Most common hash algorithms Message Digest Secure Hash Algorithm Whirlpool RIPEMD
  19. Hash Algorithms Message Digest (MD) One of the most common one-way hash algorithms Three different versions Message Digest 2 (MD2) Takes plaintext of any length and creates 128 bit hash Padding is added to make short messages 128 bits Considered too slow today and rarely used Message Digest 4 (MD4) Has flaws and was not widely accepted
  20. Hash Algorithms Message Digest 5 (MD5) Designed to address MD4’s weaknesses Message length padded to 512 bits Weaknesses in compression function could lead to collisions Some security experts recommend using a more secure hash algorithm Secure Hash Algorithm (SHA) More secure than MD SHA-3 uses a sponge function instead of stream or block ciphers
  21. Hash Algorithms Whirlpool A recent cryptographic hash function Adopted by standards organizations, including the International Organization for Standardization (ISO) Creates a hash of 512 bits Race Integrity Primitives Evaluation Message Digest (RIPEMD) The primary design feature is two different and independent parallel chains of computation The results are combined at end of process
  22. Hash Algorithms Table 5-2 Digests generated from one-time hash algorithms
  23. Symmetric Cryptographic Algorithms Symmetric cryptographic algorithms - use the same single key to encrypt and decrypt a document Original cryptographic algorithms were symmetric Also called private key cryptography (the key is kept private between sender and receiver) Common algorithms include: Data Encryption Standard Triple Data Encryption Standard Advanced Encryption Standard Several other algorithms
  24. Symmetric Cryptographic Algorithms Table 5-4 Information protection by symmetric cryptography
  25. Symmetric Cryptographic Algorithms Figure 5-6 Symmetric (private key) cryptography
  26. Symmetric Cryptographic Algorithms Data Encryption Standard (DES) Based on product originally designed in early 1970s Uses a 56-bit key and is a block cipher Triple Data Encryption standard (3DES) Designed to replace DES Uses three rounds of encryption Ciphertext of first round becomes input for second iteration Most secure versions use different keys used for each round
  27. Symmetric Cryptographic Algorithms Figure 5-7 3DES
  28. Symmetric Cryptographic Algorithms Advanced Encryption Standard (AES) A symmetric cipher approved by the NIST in 2000 as a replacement for DES Official encryption standard used by the U.S. government Performs three steps on every block (128 bits) of plaintext Designed to be secure well into the future
  29. Symmetric Cryptographic Algorithms Other Algorithms Rivest Cipher (RC) Family of cipher algorithms designed by Ron Rivest International Data Encryption Algorithm (IDEA) Used in European nations Block cipher processing 64 bits with a 128-bit key with 8 rounds Blowfish Block cipher operating on 64-bit blocks with key lengths from 32-448 bits No significant weaknesses have been identified
  30. Symmetric Cryptographic Algorithms Other Algorithms (cont’d) One-time pad (OTP) Creates a truly random key to combine with the plaintext Considered the only known method to perform encryption that cannot be broken mathematically A “pad” is a long sequence of random letters
  31. Asymmetric Cryptographic Algorithms Weakness of symmetric algorithms Distributing and maintaining a secure single key among multiple users distributed geographically Asymmetric cryptographic algorithms Also known as public key cryptography Uses two mathematically related keys Public key available to everyone and freely distributed Private key known only to individual to whom it belongs
  32. Asymmetric Cryptographic Algorithms Figure 5-8 Asymmetric (public key) cryptography
  33. Asymmetric Cryptographic Algorithms Important principles Key pairs Public key Private key Both directions - keys can work in both directions Digital signature - an electronic verification Verifies the sender Prevents sender from disowning the message Proves message integrity
  34. Asymmetric Cryptographic Algorithms Figure 5-9 Digital signature
  35. Asymmetric Cryptographic Algorithms Table 5-6 Asymmetric cryptography practices
  36. Asymmetric Cryptographic Algorithms RSA Published in 1977 and patented by MIT in 1983 Most common asymmetric cryptography algorithm Uses two large prime numbers Elliptic curve cryptography (ECC) Users share one elliptic curve and one point on the curve Uses less computing power than prime number-based asymmetric cryptography Key sizes are smaller
  37. Asymmetric Cryptographic Algorithms Figure 5-10 Elliptic curve cryptography (ECC)
  38. Asymmetric Cryptographic Algorithms Quantum cryptography Exploits the properties of microscopic objects such as photons Does not depend on difficult mathematical problems NTRUEncypt Uses lattice-based cryptography which relies on a set of points in space Faster than RSA and ECC More resistant to quantum computing attacks
  39. Asymmetric Cryptographic Algorithms Figure 5-1 Lattice-based cryptography
  40. Asymmetric Cryptographic Algorithms Quantum Cryptography Attempts to use the unusual and unique behavior of microscopic objects to enable user to securely develop and share keys Exploits the properties of microscopic objects such as photons
  41. Asymmetric Cryptographic Algorithms Key Exchange There are different solutions for a key exchange that occurs within the normal communications channel (in-band) of cryptography: Diffie-Hellman (DH) Diffie-Hellman Ephemeral (DHE) Elliptic Curve Diffie-Hellman (ECDH) Perfect forward secrecy
  42. Using Cryptography Cryptography Should be used to secure data that needs to be protected Can be applied through either software or hardware
  43. Encryption Through Software File and File System Cryptography Encryption software can be used to encrypt or decrypt files one-by-one Protecting groups of files through file system cryptography can be performed using: Pretty Good Privacy (PGP) Widely used asymmetric cryptography system Used for files and e-mails on Windows systems GNU Privacy Guard (GPG) Runs on Windows, UNIX, and Linux operating systems
  44. Encryption Through Software Microsoft Windows Encrypting File System (EFS) Cryptography system for Windows Uses NTFS file system Tightly integrated with the file system Encryption and decryption are transparent to the user Users can set encryption attribute for a file in the Advanced Attributes dialog box Storing the file in a file folder set for encryption will automatically encrypt the file Use the Cipher.exe command-line utility to encrypt files
  45. Encryption Through Software Whole disk encryption Protects all data on a hard drive Example: BitLocker drive encryption software that is included in Microsoft Windows BitLocker encrypts the entire system volume, including the Windows Registry Prevents attackers from accessing data by booting from another OS or placing the hard drive in another computer
  46. Hardware Encryption Software encryption can be subject to attacks to exploit its vulnerabilities Cryptography can be embedded in hardware Provides higher degree of security Can be applied to USB devices and standard hard drives Hardware encryption options include: Trusted platform module Hardware security model
  47. Hardware Encryption USB device encryption Encrypted hardware-based flash drives can be used Will not connect a computer until correct password has been provided All data copied to the drive is automatically encrypted Tamper-resistant external cases Administrators can remotely control and track activity on the devices Stolen drives can be remotely disabled
  48. Hardware Encryption Hard disk drive encryption Self-encrypting hard disk drives protect all files stored on them The drive and host device perform authentication process during initial power up If authentication fails, the drive can be configured to deny access or even delete encryption keys so all data is permanently unreadable
  49. Hardware Encryption Trusted Platform Module (TPM) A chip on a computer’s motherboard that provides cryptographic services Includes a true random number generator Entirely done in hardware so it cannot be subject to software attack Prevents computer from booting if files or data have been altered Prompts for password if hard drive moved to a new computer
  50. Hardware Encryption Hardware Security Module (HSM) A secure cryptographic processor Includes an onboard key generator and key storage facility Performs accelerated symmetric and asymmetric encryption Can provide services to multiple devices over a LAN
  51. Summary Cryptography is the science of transforming information into a secure form while being transmitted or stored Hashing creates a unique digital fingerprint that represents contents of original material Used only for comparison Symmetric cryptography uses a single key to encrypt and decrypt a message Stream ciphers and block ciphers
  52. Summary Asymmetric cryptography Public key cryptography Uses two keys: public key and private key Cryptography can be applied through hardware or software Hardware encryption cannot be exploited like software cryptography