Download presentation
Presentation is loading. Please wait.
Published byMay Garrett Modified over 9 years ago
1
Cryptography Chapter 14
2
Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences between asymmetric and symmetric algorithms Have a basic understanding of the concepts of cryptography and how they relate to network security continued…
3
Learning Objectives Discuss characteristics of PKI certificates and the policies and procedures surrounding them Understand the implications of key management and a certificate’s lifecycle
4
Cryptography Study of complex mathematical formulas and algorithms used for encryption and decryption Allows users to transmit sensitive information over unsecured networks Can be either strong or weak
5
Cryptography Terminology Plaintext Data that can be read without any manipulation Encryption Method of disguising plaintext to hide its substance Ciphertext Plaintext that has been encrypted and is an unreadable series of symbols and numbers
6
How Encryption and Decryption Work
7
Algorithms Mathematical functions that work in tandem with a key Same plaintext data encrypts into different ciphertext with different keys Security of data relies on: Strength of the algorithm Secrecy of the key
8
Hashing Method used for verifying data integrity Uses variable-length input that is converted to a fixed-length output string (hash value)
9
Symmetric versus Asymmetric Algorithms Type of Algorithm AdvantagesDisadvantages SymmetricSingle keyRequires sender and receiver to agree on a key before transmission of data Security lies only with the key High cost AsymmetricEncryption and decryption keys are different Decryption key cannot be calculated from encryption key Security of keys can be compromised when malicious users post phony keys
10
Symmetric Algorithms Usually use same key for encryption and decryption Encryption key can be calculated from decryption key and vice versa Require sender and receiver to agree on a key before they communicate securely Security lies with the key Also called secret key algorithms, single-key algorithms, or one-key algorithms
11
Encryption Using a Symmetric Algorithm
12
Categories of Algorithms Stream algorithms Operate on the plaintext one bit at a time Block algorithms Encrypt and decrypt data in groups of bits, typically 64 bits in size
13
Asymmetric Algorithms Use different keys for encryption and decryption Decryption key cannot be calculated from the encryption key Anyone can use the key to encrypt data and send it to the host; only the host can decrypt the data Also known as public key algorithms
15
Common Encryption Algorithms Lucifer (1974) Diffie-Hellman (1976) RSA (1977) DES (1977) Triple DES (1998) IDEA (1992) Blowfish (1993) RC5 (1995)
16
Primary Functions of Cryptography Confidentiality Authentication Integrity Nonrepudiation
17
Digital Signatures Based on asymmetric algorithms, allow the recipient to verify whether a public key belongs to its owner
19
Certificates Credentials that allow a recipient to verify whether a public key belongs to its owner Verify senders’ information with identity information that is bound to the public key Components Public key One or more digital signatures Certificate information (eg, user’s name, ID)
20
Public Key Infrastructure (PKI) Certificates Certificate storage facility that provides certification management functionality (eg, ability to issue, revoke, store, retrieve, and trust certificates) Certification authority (CA) Primary feature of PKI Trusted person or group responsible for issuing certificates to authorized users on a system Creates certificates and digitally signs them using a private key
21
PKI Policies and Practices Validity establishes that a public key certificate belongs to its owner CA issues certificates to users by binding a public key to identification information of the requester User can manually check certificate’s fingerprint
22
PKI Revocation Certificates have a restricted lifetime; a validity period is created for all certificates Certificate revocation list (CRL) Communicates which certificates within a PKI have been revoked
23
Trust Models Techniques that establish how users validate certificates Direct trust Hierarchical trust Web of trust
24
Direct Trust Model User trusts a key because the user knows where it came from
25
Hierarchical Trust Model Based on a number of root certificates
27
Web of Trust Combines concepts of direct trust and hierarchical trust Adds the idea that trust is relative to each requester Central theme: the more information available, the better the decision
28
Key and Certificate Life Cycle Management Setup or initialization Administration of issued keys and certificates Certificate cancellation and key history
29
Setup and Initialization Registration Key pair generation Certificate creation Certificate distribution Certificate dissemination Key backup
30
Registration User requests certificate from CA CA verifies identity and credentials of user Certificate practice statement Published document that explains CA structure to users Certificate policy establishes: Who may serve as CA What types of certificates may be issued How they should be issued and managed
31
Key Pair Generation Involves creation of one or more key pairs using different algorithms Dual or multiple keys are often utilized to perform different roles to support distinct services Key pair can be restricted by policy to certain roles based on usage factors Multiple key pairs usually require multiple certificates
32
Certificates Distinguished name (DN) Unique identifier that is bound to a certificate by a CA Uses a sequence of character(s) that is unique to each user Appropriate certificate policies govern creation and issuance of certificates
33
Certificate Dissemination Techniques Securely make certificate information available to requester without too much difficulty Out-of-band distribution In-band distribution Publication Centralized repositories with controlled access
34
Key Backup Addresses lost keys Helps recover encrypted data Essential element of business continuity and disaster recovery planning
35
Key Escrow Key administration process that utilizes a third party Initialization phase involves: Certificate retrieval and validation Key recovery and key update
36
Cancellation Procedures Certificate expiration Certificate revocation Key history Key archive
37
Certificate Expiration Occurs when validity period of a certificate expires Options upon expiration Certificate renewal Certificate update
38
Certificate Revocation Implies cancellation of a certificate prior to its natural expiration Revocation delay Delay associated with the revocation requirement and subsequent notification
39
Certificate Revocation How notification is accomplished Certificate revocation lists (CRLs) CRL distribution points Certificate revocation trees (CRTs) Redirect/Referral CRLs Notification is unnecessary for: Short certificate lifetimes Single-entity approvals
40
Key History Deals with secure and reliable storage of expired keys for later retrieval to recover encrypted data Applies more to encryption keys than signing keys
41
Key Archive Service undertaken by a CA or third party to store keys and verification certificates Meets audit requirements and handles resolution of disputes when used with other services (eg, time stamping and notarization)
42
Setting up an Enterprise PKI Extremely complex task with enormous demands on financial, human, hardware, and software resources Areas to explore Basic support Training Documentation issues
43
Areas to Explore in Detail When Setting up an Enterprise PKI Support for standards, protocols, and third- party applications Issues related to cross-certification, interoperability, and trust models Multiple key pairs and key pair uses How to PKI-enable applications and client- side software availability continued…
44
Areas to Explore in Detail When Setting up an Enterprise PKI Impact on end user for key backup, key or certificate update, and nonrepudiation services Performance, scalability, and flexibility issues regarding distribution, retrieval, and revocation systems Physical access control to facilities
45
Chapter Summary Ways that algorithms and certificate mechanisms are used to encrypt data flows Concepts of cryptography Key and certificate life cycle management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.