Chapter 7: Cryptographic Systems

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Encryption Matches Domain 4.0 Basics of Cryptography (15 percent of Security +) Network Security Class Dr. Kleist Note: Most material from Harris, Shon.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography and Network Security Chapter 17
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Chapter 8 Web Security.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 7 – Cryptographic Systems.
Chapter 31 Network Security
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Linux Networking and Security Chapter 8 Making Data Secure.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 11: Managing a Secure Network
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Chapter 8: Implementing Virtual Private Networks
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 3: Authentication, Authorization, and Accounting
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 6: Securing the Local Area Network
Chapter 4: Implementing Firewall Technologies
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Chapter 8 Network Security.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Chapter 8 Network Security.
Network Security Chapter 8.
Presentation transcript:

Chapter 7: Cryptographic Systems CCNA Security v2.0

Chapter Outline 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary Chapter Outline

Section 7.1: Cryptographic Services Upon completion of this section, you should be able to: Explain the requirements of secure communications including integrity, authentication, and confidentiality. Explain cryptography. Describe cryptoanalysis. Describe cryptology.

Topic 7.1.1: Securing Communications

Authentication, Integrity, and Confidentiality

Authentication 7.1.1.2 Authentication

Data Integrity 7.1.1.3 Data Integrity

Data Confidentiality 7.1.1.4 Data Confidentiality 7.1.1.5 Activity – Identify the Secure Communication Objective

Topic 7.1.2: Cryptography

Creating Ciphertext Ciphertext can be creating using several methods: Transposition Substitution One-time pad 7.1.2.1 Creating Ciphertext

Transposition Ciphers

Substitution Ciphers xxxx 7.1.2.3 Substitution Ciphers 7.1.2.4 Substitution Ciphers (Cont.)

One-Time Pad Ciphers 7.1.2.5 One-Time Pad Ciphers

Topic 7.1.3: Cryptanalysis

Cracking Code 7.1.3.1 Cracking Code

Methods for Cracking Code Methods used for cryptanalysis: Brute-force method Ciphertext method Known-Plaintext method Chosen-Plaintext method Chosen-Ciphertext method Meet-in-the-Middle method 7.1.3.2 Methods for Cracking Code

Methods for Cracking Code Frequency Analysis of the English Alphabet 7.1.3.3 Cracking Code Example Deciphering Using Frequency Analysis

Topic 7.1.4: Cryptology

Making and Breaking Secret Codes

Cryptanalysis 7.1.4.2 Cryptanalysis

The Secret is in the Keys 7.1.4.4 Activity – Identify the Cryptology Terminology

Section 7.2: Basic Integrity and Authenticity Upon completion of the section, you should be able to: Describe the purpose of cryptographic hashes. Explain how MD5 and SHA-1 are used to secure data communications. Describe authenticity with HMAC. Describe the components of key management.

Topic 7.2.1: Cryptographic Hashes

Cryptographic Hash Function

Cryptographic Hash Function Properties

Well-Known Hash Functions

Topic 7.2.2: Integrity with MD5, SHA-1, and SHA-2

Message Digest 5 Algorithm

Secure Hash Algorithm 7.2.2.2 Secure Hash Algorithm

MD5 Versus SHA 7.2.2.3 MD5 Versus SHA

Topic 7.2.3: Authenticity with HMAC

Keyed-Hash Message Authentication Code

HMAC Operation 7.2.3.2 HMAC Operation

Hashing in Cisco Products

Topic 7.2.4: Key Management

Characteristics of Key Management

Key Length and Keyspace 7.2.4.2 Key Size and Keyspace

The Keyspace 7.2.4.3 The Keyspace

Types of Cryptographic Keys Symmetric keys Asymmetric keys Digital signatures Hash keys 7.2.4.4 Types of Cryptographic Keys

Choosing Cryptographic Keys 7.2.4.6 Activity – Identify the Characteristics of Key Management

Section 7.3: Confidentiality Upon completion of the section, you should be able to: Explain how encryption algorithms provide confidentiality. Explain the function of the DES, 3DES, and the AES algorithms . Describe the function of the Software Encrypted Algorithm (SEAL) and the Rivest ciphers (RC) algorithms.

Topic 7.3.1: Encryption

Two Classes of Encryption Algorithms

Symmetric and Asymmetric Encryption

Symmetric Encryption 7.3.1.3 Symmetric Encryption

Symmetric Block Ciphers and Stream Ciphers

Choosing an Encryption Algorithm 7.3.1.6 Activity – Compare Symmetric and Asymmetric Encryption Algorithms

Topic 7.3.2: Data Encryption Standard

DES Symmetric Encryption

DES Summary 7.3.2.2 DES Summary

Improving DES with 3DES 7.3.2.3 Improving DES with 3DES

3DES Operation 7.3.2.4 3DES Operation

AES Origins 7.3.2.5 AES Origins

AES Summary 7.3.2.6 AES Summary

Topic 7.3.3: Alternate Encryption Algorithms

Software-Optimized Encryption Algorithm (SEAL) SEAL has several restrictions: The Cisco router and the peer must support IPsec. The Cisco router and the other peer must run an IOS image that supports encryption. The router and the peer must not have hardware IPsec encryption. 7.3.3.1 Software-Optimized Encryption Algorithm (SEAL)

RC Algorithms 7.3.3.2 RC Algorithms

Topic 7.3.4: Diffie-Hellman Key Exchange

Diffie-Hellman (DH) Algorithm

DH Operation 7.3.4.2 DH Operation 7.3.4.3 Activity – Identify the Steps of the DH Process

Section 7.4: Public Key Cryptography Upon completion of the section, you should be able to: Explain the differences between symmetric and asymmetric encryptions and their intended applications. Explain the functionality of digital signatures. Explain the principles of a public key infrastructure (PKI).

Topic 7.4.1: Symmetric Versus Asymmetric Encryption

Asymmetric Key Algorithms Four protocols that use asymmetric key algorithms: Internet Key Exchange (IKE) Secure Socket Layer (SSL) Secure Shell (SSH) Pretty Good Privacy (PGP) 7.4.1.1 Asymmetric Key Algorithms

Public Key + Private Key = Confidentiality

Private Key + Public Key = Authenticity

Asymmetric Algorithms Please use all 4 Figs from this page with the Graphic titles as they tell a story. It may require 2 slides. Asymmetric Algorithms Alice Encrypts Message Using Bob’s Public Key Alice Encrypts A Hash Using Bob’s Public Key 7.4.1.4 Asymmetric Algorithms

Asymmetric Algorithms Bob Uses Alice’s Public Key to Decrypt Hash Bob Uses His Public Key to Decrypt Message 7.4.1.4 Asymmetric Algorithms (Cont.)

Types of Asymmetric Algorithms 7.4.1.6 Activity – Identify the Key Types Required to Provide Authenticity and Confidentiality

Topic 7.4.2: Digital Signatures

Using Digital Signatures Digital Signature Properties: Signature is authentic Signature is unalterable Signature is not reusable Signature cannot be repudiated 7.4.2.1 Using Digital Signatures

Code Signing Digitally signing code provides several assurances about the code: The code is authentic and is actually sourced by the publisher. The code has not been modified since it left the software publisher. The publisher undeniably published the code. 7.4.2.2 Code Signing

Digital Certificates 7.4.2.3 Digital Certificates

Using Digital Certificates Sending a Digital Certificate 7.4.2.4 Using Digital Certificates Receiving a Digital Certificate

Digital Signature Algorithms DSA Scorecard 7.4.2.5 Digital Signature Algorithms 7.4.2.6 Activity – Compare Code Signing and Digital Certificates RSA Scorecard

Topic 7.4.3: Public Key Infrastructure

Public Key Infrastructure Overview

PKI Framework Elements of the PKI Framework PKI Example

Certificate Authorities

Interoperability of Different PKI Vendors

Public-Key Cryptography Standards

Simple Certificate Enrollment Protocol

PKI Topologies Single-Root PKI Topology Cross Certified CA Hierarchical CA

Registration Authority

Digital Certificates and CAs Retrieving CA Certificates 7.4.3.9 Digital Certificates and CAs Submitting Certificate Requests to the CA

Digital Certificates and CAs Peers Authenticate Each Other 7.4.3.9 Digital Certificates and CAs (Cont.) 7.4.3.10 Activity – Identify Elements of the PKI Framework

Section 7.5: Summary Chapter Objectives: Explain the areas of cryptology. Explain to two kinds of encryption algorithms. 7.5.1.1 Video Demonstration – Wireshark Packet Sniffing Usernames, Password, and Web Pages 7.5.1.2 Lab – Exploring Encryption Methods 7.5.1.3 Summary

Instructor Resources Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) These resources cover a variety of topics including navigation, assessments, and assignments. A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2 https://www.netacad.com