SlideShare a Scribd company logo
1 of 35
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information
Systems Security
Cryptography
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
Page 2
 Explain how businesses apply
cryptography in maintaining information
security.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 3
 Basics of cryptography
 Business applications of cryptography
 Symmetric and asymmetric key cryptography
 Encryption mechanisms and techniques
 Certificate and key management
What Is Cryptography?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 4
 Unencrypted information—Information in
understandable form (plaintext or cleartext).
 Encrypted information—Information in scrambled form
(ciphertext).
 Encryption—The process of scrambling plaintext into
ciphertext.
 Decryption—The process of unscrambling ciphertext into
plaintext.
 Algorithm—A repeatable process that produces the
same result when it receives the same input.
 Cipher—An algorithm to encrypt or decrypt information.
A Cryptosystem at Work
Encryption Cipher Categories
 Those that use the same key to encrypt and
decrypt are private (symmetric) key ciphers
 Those that use different keys to encrypt and
decrypt are public (asymmetric) key ciphers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
Basic Cryptographic Principles
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
Keyspace—The number of possible keys
to a cipher.
Open ciphers—Make it possible for
experts around the world to examine the
ciphers for weaknesses.
Data Encryption Standard (DES)—The
most scrutinized cipher in history.
A Brief History of Cryptography
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
People have used cryptography to protect
information for at least 4,000 years.
Steganography is the act of hiding
information.
Cryptanalysis is breaking code.
Cryptography was used in WWI and WWII.
Symmetric and asymmetric key
cryptography introduced in 1976.
Cryptography’s Role in Information
Security
Confidentiality
• Keeps information secret from unauthorized users.
Integrity
• Ensures that no one, even the sender, changes
information after transmitting it.
Authentication
• Confirms the identity of an entity.
Nonrepudiation
• Enables you to prevent a party from denying a
previous statement or action.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
Business and Security Requirements
for Cryptography
Internal security
• Confidentiality, privacy, integrity, and authorization.
Security in business relationships
• Message authentication, signature, receipt and
confirmation, and nonrepudiation.
Security measures that benefit everyone
• Anonymity, timestamping, revocation, and
ownership.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
Information Security Objectives
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
Objective Steps to Take
Privacy or
confidentiality
Keep information secret from all
unauthorized users.
Integrity Ensure that unauthorized users or
unknown processes have not altered
information.
Entity authentication
or identification
Corroborate the identity of an entity
(that is, a person, a computer
terminal, a credit card, etc.).
Message
authentication
Corroborate the source of
information; authenticate the data’s
origin.
Signature Bind information to an entity.
Information Security Objectives
(cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Objective Steps to Take
Authorization Convey an official sanction to do or be
something to another entity.
Validation Provide timely authorization to use or
manipulate information or resources.
Access control Restrict access to resources to privileged
entities.
Certification Endorse information by a trusted entity.
Timestamping Record the time a user created or
accessed information.
Witnessing Verify the action to create an object or
verify an object’s existence by an entity
other than the creator.
Information Security Objectives
(cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
Objective Steps to Take
Receipt Acknowledge that the recipient received
information.
Confirmation Acknowledge that the provider has
provided services.
Ownership Grant an entity the legal right to use or
transfer a resource to others.
Anonymity Conceal the identity of an entity involved
in some process.
Nonrepudiation Prevent an entity from denying previous
commitments or actions.
Revocation Retract certification or authorization.
Cryptographic Functions and
Ciphers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
 Each cipher has specific characteristics that make it
desirable or undesirable.
 When evaluating a cipher, consider its intended use
• Are you trying to secure data in transit or data at rest?
• Different ciphers solve different problems better than
others.
 After selecting a cipher, you must make additional
decisions about key size, operational mode, etc.
 Many symmetric ciphers operate as either a stream
cipher or a block cipher.
Business-Security Implementations
General Classifications
• Authentication (non-PKI)
• Access control/authorization
• Assessment and audit
• Security management products
• Perimeter/network security/availability
• Content filtering
• Encryption
• Administration/education
• Outsource services/consultants
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
Cryptography Capabilities
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Privacy or
confidentiality
Integrity
or identification
Message
authentication
Signature
Access control
Certification
Timestamping
Entity authentication Witnessing
Ownership
Anonymity
Nonrepudiation
Types of Ciphers
• Rearranges characters or bits
of data
Transposition
ciphers
• Replaces bits, characters, or
blocks of information with
other bits, characters, or
blocks
Substitution
ciphers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
Transposition Ciphers
Message— ATTACK AT Five
Ciphertext— ACFTKITAVATE
Key— {1,2,3,4}
1 2 3 4
A T T A
C K A T
F I V E
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
Substitution Ciphers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
 Caesar cipher—Each letter in the English alphabet a
fixed number of positions, with Z wrapping back to A.
 Keyword mixed alphabet cipher—Uses a cipher
alphabet that consists of a keyword, minus
duplicates, followed by the remaining letters of the
alphabet
 Vigenère (vee-zhen-AIR) cipher—Encrypts every
letter with its own substitution scheme
 Simple substitution cipher—Allows any letter to
uniquely map to any other letter
Symmetric and Asymmetric Key
Cryptography
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
 Symmetric key ciphers use the same key to
encrypt and decrypt.
 Asymmetric key ciphers have four key
properties:
• Two associated algorithms that are inverses of each
other exist.
• Each of these two algorithms is easy to compute.
• It is computationally infeasible to derive the second
algorithm if you know the first algorithm.
• Given some random input, you can generate
associated key pairs that are inverses of each other.
Keys, Keyspace, and Key
Management
Key
• A value that is an input to a cryptosystem
Keyspace
• The set of all possible keys
Key management
• One of the most difficult and critical parts of a
cryptosystem
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
Key Distribution Techniques
Paper
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Digital
media
Hardware
Key Distribution Techniques
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
 Paper distribution requires no technology to use. However, it does
require a person to do something to install the key. This human role
can introduce errors or give a disgruntled person a chance to
compromise a system.
 Digital distribution can be in the form of CDs or email. Note that
you must protect the keys in transit. Some form of secure
transmission must be used.
 You can distribute a key via hardware with a Personal Computer
Memory Card International Association (PCMCIA) card, a smart
card, or a plug-in module.
 The advantage is that you transfer the keys directly from the key-
transport mechanism into the crypto device without anyone viewing
them. No copies exist outside of these components.
Hash Functions
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
Checksum
• Summary information appended to a message to
ensure that the values of the message have not
changed.
Hash
• Like a checksum but operates so that a forged
message will not result in the same hash as a
legitimate message.
• Is usually a fixed size.
• Acts as a fingerprint for data.
Digital Signatures
Bind the identity of an entity to a particular
message or piece of information.
Ensure the integrity of a message and
verify who wrote it.
Require asymmetric key cryptography.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
Cryptographic Applications and
Uses in Information System Security
Security product and service categories:
• Anti-malware
• Forensics
• ID management
• Messaging safeguards
• Patch management
• Perimeter defenses
• Transaction security (digital certificates, secure file
transfer)
• Wireless security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
Cryptographic Applications and
Uses in Information System Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
 Authentication tools include tokens, smart
cards, biometrics, passwords, and password
recovery.
 Access control and authorization includes
firewalls, timestamping, single sign-on, identity
management, and mobile device security.
 Assessment and auditing tools include
vulnerability-assessment scanners, penetration
testing tools, forensic software, and log analyzers.
Cryptographic Applications and
Uses in Information System Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
 Security management products include tools for
enterprise security management, configuration and patch
management, and security policy development.
 Wireless security tools encrypt data to protect them in
transit and to limit access to authorized people.
 Encryption tools include line encryption, database
security products, virtual private networks (VPNs), public
key infrastructure (PKI), and crypto accelerators.
Symmetric Key Standards
Data Encryption Standard (DES)
Triple DES (3DES)
International Data Encryption Algorithm (IDEA)
CAST
Blowfish
Advanced Encryption Standard (AES)
RC2
RC4
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
Asymmetric Key Solutions
An asymmetric
key solution
doesn’t require
each party to
first share a
secret key
The key
directory is a
trusted
repository of all
public keys
A key escrow is
a key storage
method that
allows some
authorized third
party access to a
key under certain
circumstances
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
Asymmetric Key Solutions
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 30
 The SSL Handshake Protocol consists of two
phases: server authentication and an optional client
authentication.
 Digital signatures verify a person’s identity or that
person’s association with a message.
 A certificate authority (CA) vouches for the validity
of a credential, and maintains a list of invalid, or
revoked, certificates in either a certificate
revocations list (CRL) or by maintaining the data to
support the newer online certificate status protocol
(OCSP).
Hash Function and Integrity
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 31
 Hash functions:
• Help detect forgeries.
• Compute a checksum of a message.
• Combine the checksum with a cryptographic function
so that the result is tamperproof.
 A hash is:
• A checksum designed so that no one can forge a
message in a way that will result in the same hash as
a legitimate message.
• Usually a fixed size, resulting in a hash value, which is
larger than checksum values.
Hashing Algorithms
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 32
 MD5 message digest algorithm—Takes an input of any
arbitrary length and generates a 128-bit message digest
that is computationally infeasible to match by finding
another input.
 Secure Hash Algorithm (SHA-1)—Produces a 160-bit
hash from a message of any arbitrary length.
 Hash message authentication code (HMAC)—A hash
function that uses a key to create the hash, or message
digest
 RACE Integrity Primitives Evaluation Message Digest
(RIPEMD)—A collection of functions that provide hash
values for a wide range of applications.
Digital Signatures and
Nonrepudiation
A digitized signature is an
image of a physical signature
stored in digital format
A digital signature is a
combination of a strong hash
of a message, which acts as a
fingerprint
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 33
Principles of Certificates and Key
Management
The best key management system in the
world does not protect against a brilliant
cryptanalyst if the encryption algorithm itself
has any weaknesses
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 34
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 35
Basics of cryptography
Business applications of cryptography
Symmetric and asymmetric key
cryptography
Encryption mechanisms and
techniques
Certificate and key management

More Related Content

Similar to cryptography.pptx

Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
 

Similar to cryptography.pptx (20)

Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptxDr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
Funsec3e ppt ch11
Funsec3e ppt ch11Funsec3e ppt ch11
Funsec3e ppt ch11
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 

Recently uploaded

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Recently uploaded (20)

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 

cryptography.pptx

  • 1. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Cryptography
  • 2. Learning Objective(s) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. Page 2  Explain how businesses apply cryptography in maintaining information security.
  • 3. Key Concepts © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  Basics of cryptography  Business applications of cryptography  Symmetric and asymmetric key cryptography  Encryption mechanisms and techniques  Certificate and key management
  • 4. What Is Cryptography? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4  Unencrypted information—Information in understandable form (plaintext or cleartext).  Encrypted information—Information in scrambled form (ciphertext).  Encryption—The process of scrambling plaintext into ciphertext.  Decryption—The process of unscrambling ciphertext into plaintext.  Algorithm—A repeatable process that produces the same result when it receives the same input.  Cipher—An algorithm to encrypt or decrypt information.
  • 5. A Cryptosystem at Work Encryption Cipher Categories  Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers  Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5
  • 6. Basic Cryptographic Principles © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6 Keyspace—The number of possible keys to a cipher. Open ciphers—Make it possible for experts around the world to examine the ciphers for weaknesses. Data Encryption Standard (DES)—The most scrutinized cipher in history.
  • 7. A Brief History of Cryptography © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7 People have used cryptography to protect information for at least 4,000 years. Steganography is the act of hiding information. Cryptanalysis is breaking code. Cryptography was used in WWI and WWII. Symmetric and asymmetric key cryptography introduced in 1976.
  • 8. Cryptography’s Role in Information Security Confidentiality • Keeps information secret from unauthorized users. Integrity • Ensures that no one, even the sender, changes information after transmitting it. Authentication • Confirms the identity of an entity. Nonrepudiation • Enables you to prevent a party from denying a previous statement or action. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8
  • 9. Business and Security Requirements for Cryptography Internal security • Confidentiality, privacy, integrity, and authorization. Security in business relationships • Message authentication, signature, receipt and confirmation, and nonrepudiation. Security measures that benefit everyone • Anonymity, timestamping, revocation, and ownership. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10. Information Security Objectives © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10 Objective Steps to Take Privacy or confidentiality Keep information secret from all unauthorized users. Integrity Ensure that unauthorized users or unknown processes have not altered information. Entity authentication or identification Corroborate the identity of an entity (that is, a person, a computer terminal, a credit card, etc.). Message authentication Corroborate the source of information; authenticate the data’s origin. Signature Bind information to an entity.
  • 11. Information Security Objectives (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11 Objective Steps to Take Authorization Convey an official sanction to do or be something to another entity. Validation Provide timely authorization to use or manipulate information or resources. Access control Restrict access to resources to privileged entities. Certification Endorse information by a trusted entity. Timestamping Record the time a user created or accessed information. Witnessing Verify the action to create an object or verify an object’s existence by an entity other than the creator.
  • 12. Information Security Objectives (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12 Objective Steps to Take Receipt Acknowledge that the recipient received information. Confirmation Acknowledge that the provider has provided services. Ownership Grant an entity the legal right to use or transfer a resource to others. Anonymity Conceal the identity of an entity involved in some process. Nonrepudiation Prevent an entity from denying previous commitments or actions. Revocation Retract certification or authorization.
  • 13. Cryptographic Functions and Ciphers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13  Each cipher has specific characteristics that make it desirable or undesirable.  When evaluating a cipher, consider its intended use • Are you trying to secure data in transit or data at rest? • Different ciphers solve different problems better than others.  After selecting a cipher, you must make additional decisions about key size, operational mode, etc.  Many symmetric ciphers operate as either a stream cipher or a block cipher.
  • 14. Business-Security Implementations General Classifications • Authentication (non-PKI) • Access control/authorization • Assessment and audit • Security management products • Perimeter/network security/availability • Content filtering • Encryption • Administration/education • Outsource services/consultants © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14
  • 15. Cryptography Capabilities © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Privacy or confidentiality Integrity or identification Message authentication Signature Access control Certification Timestamping Entity authentication Witnessing Ownership Anonymity Nonrepudiation
  • 16. Types of Ciphers • Rearranges characters or bits of data Transposition ciphers • Replaces bits, characters, or blocks of information with other bits, characters, or blocks Substitution ciphers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16
  • 17. Transposition Ciphers Message— ATTACK AT Five Ciphertext— ACFTKITAVATE Key— {1,2,3,4} 1 2 3 4 A T T A C K A T F I V E © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17
  • 18. Substitution Ciphers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18  Caesar cipher—Each letter in the English alphabet a fixed number of positions, with Z wrapping back to A.  Keyword mixed alphabet cipher—Uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet  Vigenère (vee-zhen-AIR) cipher—Encrypts every letter with its own substitution scheme  Simple substitution cipher—Allows any letter to uniquely map to any other letter
  • 19. Symmetric and Asymmetric Key Cryptography © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19  Symmetric key ciphers use the same key to encrypt and decrypt.  Asymmetric key ciphers have four key properties: • Two associated algorithms that are inverses of each other exist. • Each of these two algorithms is easy to compute. • It is computationally infeasible to derive the second algorithm if you know the first algorithm. • Given some random input, you can generate associated key pairs that are inverses of each other.
  • 20. Keys, Keyspace, and Key Management Key • A value that is an input to a cryptosystem Keyspace • The set of all possible keys Key management • One of the most difficult and critical parts of a cryptosystem © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20
  • 21. Key Distribution Techniques Paper © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Digital media Hardware
  • 22. Key Distribution Techniques © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22  Paper distribution requires no technology to use. However, it does require a person to do something to install the key. This human role can introduce errors or give a disgruntled person a chance to compromise a system.  Digital distribution can be in the form of CDs or email. Note that you must protect the keys in transit. Some form of secure transmission must be used.  You can distribute a key via hardware with a Personal Computer Memory Card International Association (PCMCIA) card, a smart card, or a plug-in module.  The advantage is that you transfer the keys directly from the key- transport mechanism into the crypto device without anyone viewing them. No copies exist outside of these components.
  • 23. Hash Functions © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23 Checksum • Summary information appended to a message to ensure that the values of the message have not changed. Hash • Like a checksum but operates so that a forged message will not result in the same hash as a legitimate message. • Is usually a fixed size. • Acts as a fingerprint for data.
  • 24. Digital Signatures Bind the identity of an entity to a particular message or piece of information. Ensure the integrity of a message and verify who wrote it. Require asymmetric key cryptography. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24
  • 25. Cryptographic Applications and Uses in Information System Security Security product and service categories: • Anti-malware • Forensics • ID management • Messaging safeguards • Patch management • Perimeter defenses • Transaction security (digital certificates, secure file transfer) • Wireless security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25
  • 26. Cryptographic Applications and Uses in Information System Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26  Authentication tools include tokens, smart cards, biometrics, passwords, and password recovery.  Access control and authorization includes firewalls, timestamping, single sign-on, identity management, and mobile device security.  Assessment and auditing tools include vulnerability-assessment scanners, penetration testing tools, forensic software, and log analyzers.
  • 27. Cryptographic Applications and Uses in Information System Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27  Security management products include tools for enterprise security management, configuration and patch management, and security policy development.  Wireless security tools encrypt data to protect them in transit and to limit access to authorized people.  Encryption tools include line encryption, database security products, virtual private networks (VPNs), public key infrastructure (PKI), and crypto accelerators.
  • 28. Symmetric Key Standards Data Encryption Standard (DES) Triple DES (3DES) International Data Encryption Algorithm (IDEA) CAST Blowfish Advanced Encryption Standard (AES) RC2 RC4 © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
  • 29. Asymmetric Key Solutions An asymmetric key solution doesn’t require each party to first share a secret key The key directory is a trusted repository of all public keys A key escrow is a key storage method that allows some authorized third party access to a key under certain circumstances © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29
  • 30. Asymmetric Key Solutions © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 30  The SSL Handshake Protocol consists of two phases: server authentication and an optional client authentication.  Digital signatures verify a person’s identity or that person’s association with a message.  A certificate authority (CA) vouches for the validity of a credential, and maintains a list of invalid, or revoked, certificates in either a certificate revocations list (CRL) or by maintaining the data to support the newer online certificate status protocol (OCSP).
  • 31. Hash Function and Integrity © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 31  Hash functions: • Help detect forgeries. • Compute a checksum of a message. • Combine the checksum with a cryptographic function so that the result is tamperproof.  A hash is: • A checksum designed so that no one can forge a message in a way that will result in the same hash as a legitimate message. • Usually a fixed size, resulting in a hash value, which is larger than checksum values.
  • 32. Hashing Algorithms © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 32  MD5 message digest algorithm—Takes an input of any arbitrary length and generates a 128-bit message digest that is computationally infeasible to match by finding another input.  Secure Hash Algorithm (SHA-1)—Produces a 160-bit hash from a message of any arbitrary length.  Hash message authentication code (HMAC)—A hash function that uses a key to create the hash, or message digest  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)—A collection of functions that provide hash values for a wide range of applications.
  • 33. Digital Signatures and Nonrepudiation A digitized signature is an image of a physical signature stored in digital format A digital signature is a combination of a strong hash of a message, which acts as a fingerprint © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 33
  • 34. Principles of Certificates and Key Management The best key management system in the world does not protect against a brilliant cryptanalyst if the encryption algorithm itself has any weaknesses © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 34
  • 35. Summary © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 35 Basics of cryptography Business applications of cryptography Symmetric and asymmetric key cryptography Encryption mechanisms and techniques Certificate and key management