0% found this document useful (0 votes)
10 views12 pages

Module 3&4

The document provides a comprehensive overview of cryptographic solutions, including definitions and functions of encryption, data states, algorithms, and key management. It distinguishes between symmetric and asymmetric encryption, discusses hashing and digital signatures, and explains the role of Public Key Infrastructure (PKI) and blockchain technology in secure communications. Additionally, it covers encryption tools, obfuscation techniques, and potential cryptographic attacks.

Uploaded by

mpilobiyela2628
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views12 pages

Module 3&4

The document provides a comprehensive overview of cryptographic solutions, including definitions and functions of encryption, data states, algorithms, and key management. It distinguishes between symmetric and asymmetric encryption, discusses hashing and digital signatures, and explains the role of Public Key Infrastructure (PKI) and blockchain technology in secure communications. Additionally, it covers encryption tools, obfuscation techniques, and potential cryptographic attacks.

Uploaded by

mpilobiyela2628
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cryptographic Solutions

Cryptography: Practice and study of writing and solving codes.


Encryption to hide information's true meaning.

Encryption: Converts plaintext to ciphertext. Provides data protection at


rest, in transit, and in use.

Data States:

 Data at Rest: Inactive data on storage devices.

 Data in Transit: Moving across networks.

 Data in Use: Currently undergoing change.

Algorithm and Key:

 Algorithm (Cipher): Performs encryption or decryption.

 Key: Essential for determining cipher output. Key Strength and


Rotation.

Key Strength and Rotation:

 Key Length: Proportional to security.

 Key Rotation: Best practice for security longevity.

Symmetric and Asymmetric Encryption:

 Symmetric: Uses same key for encryption and decryption.

 Asymmetric: Uses a pair of keys for encryption and decryption.

Symmetric Algorithms:

 DES

 Triple DES

 IDEA

 AES

 Blowfish

 Twofish

 Rivest Cipher

Asymmetric Algorithms:

 Diffie-Hellman

 RSA
 Elliptic Curve Cryptography

Hashing: Converts data into fixed-size string (digest) using hash


functions.

Algorithms

 MD5

 SHA Family (RIPEMD, HMAC)

Public Key Infrastructure (PKI): Framework managing digital keys and


certificates for secure data transfer.

Digital Certificates: Electronic credentials verifying entity identity for


secure communications.

Blockchain: Decentralized, immutable ledger ensuring data integrity and


transparency.

Encryption Tools

 TPM

 HSM

 Key Management Systems

 Secure Enclave

Obfuscation

 Steganography

 Tokenization

 Data Masking

Cryptographic Attacks

 Downgrade Attacks

 Collision Attacks

 Quantum Computing Threats

Symmetric vs Asymmetric

Symmetric Encryption
Uses a single key for both encryption and decryption. Often referred to as
private key encryption. Requires both sender and receiver to share the
same secret key. Offers confidentiality but lacks non-repudiation.
Challenges with key distribution in large-scale usage.
Asymmetric Encryption
Uses two separate keys:

 Public key for encryption

 Private key for decryption

Often called “Public Key Cryptography”. No need for shared secret keys.
Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic Curve
Cryptography (ECC). Slower compared to symmetric encryption but solves
key distribution challenges.

Hybrid Approach
Combines both symmetric and asymmetric encryption for optimal
benefits. Asymmetric encryption used to encrypt and share a secret key.
Symmetric encryption used for bulk data transfer, leveraging the shared
secret key. Offers security and efficiency.

Stream Cipher
Encrypts data bit-by-bit or byte-by-byte in a continuous stream. Uses a
keystream generator and exclusive XOR function for encryption. Suitable
for real-time communication data streams like audio and video. Often
used in symmetric algorithms.

Block Cipher
Breaks input data into fixed-size blocks before encryption. Usually 64, 128,
or 256 bits at a time. Padding added to smaller data blocks to fit the fixed
block size. Advantages include ease of implementation and security. Can
be implemented in software, whereas stream ciphers are often used in
hardware solutions.

Symmetric Algorithms

DES (Data Encryption Standard)


Uses a 64-bit key (56 effective bits due to parity). Encrypts data in 64-bit
blocks through 16 rounds of transposition and substitution. Widely used
from the 1970s to the early 2000s.

Triple DES (3DES)


Utilizes three 56-bit keys. Encrypts data with the first key, decrypts with
the second key, and encrypts again with the third key. Provides 112-bit
key strength but is slower than DES.

IDEA (International Data Encryption Algorithm)


A symmetric block cipher with a 64-bit block size. Uses a 128-bit key,
faster and more secure than DES. Not as widely used as AES.

AES (Advanced Encryption Standard)


Replaced DES and 3DES as the US government encryption standard.
Supports 128-bit, 192-bit, or 256-bit keys and matching block sizes.
Widely adopted and considered the encryption standard for sensitive
unclassified information.

Blowfish
A block cipher with key sizes ranging from 32 to 448 bits. Developed as a
DES replacement but not widely adopted.

Twofish
A block cipher supporting 128-bit block size and key sizes of 128, 192, or
256 bits. Open source and available for use.

RC Cipher Suite (RC4, RC5, RC6):


Created by cryptographer, Ron Rivest. RC4 is a stream cipher with
variable key sizes from 40 to 2048 bits, used in SSL and WEP. RC5 is a
block cipher with key sizes up to 2048 bits. RC6, based on RC5, was
considered as a DES replacement.

Classification:
All the mentioned algorithms are symmetric. Most are block ciphers
except for RC4, which is a stream cipher.

Note: When working with encryption, identify if it's symmetric or


asymmetric and whether it's a block or stream cipher.

Asymmetric Algorithms

Public Key Cryptography


No shared secret key required. Uses a key pair:

 Public key for encryption

 Private key for decryption


Provides confidentiality, integrity, authentication, and non-
repudiation.

Confidentiality with Public Key


Encrypt data using the receiver's public key. Only the recipient with the
corresponding private key can decrypt it.

Non-Repudiation with Private Key


Encrypt data using the sender's private key. Anyone with access to the
sender's public key can verify the sender's identity.

Integrity and Authentication with Digital Signature

 Create a hash digest of the message. Encrypt the hash digest with
the sender's private key.
 Digital Signature: A hash digest of a message encrypted with the
sender’s private key to let the recipient know the document was
created and sent by the person claiming to have sent it.

 Encrypt the message with the receiver's public key. Ensures


message integrity, non-repudiation, and confidentiality.

Common Asymmetric Algorithms:

 Diffie-Hellman: Used for key exchange and secure key distribution.


Vulnerable to man-in-the-middle attacks, requires authentication.
Commonly used in VPN tunnel establishment (IPSec).

 RSA (Ron Rivest, Adi Shamir, Leonard Adleman): Used for key
exchange, encryption, and digital signatures.

Elliptic Curve Cryptography (ECC)


Efficient and secure, uses algebraic structure of elliptical curves.
Commonly used in mobile devices and low-power computing. Six times
more efficient than RSA for equivalent security. Variants include ECDH
(Elliptic Curve Diffie-Hellman), ECDHE (Elliptic Curve Diffie-Hellman
Ephemeral), ECDSA (Elliptic Curve Digital Signature Algorithm).

Hashing

One-way cryptographic function that produces a unique message digest


from an input.

Hash Digest:
Like a digital fingerprint for the original data. Always of the same length
regardless of the input's length.

Common Hashing Algorithms

 MD5 (Message Digest Algorithm 5): Creates a 128-bit hash


value. Limited unique values, leading to collisions. Not
recommended for security-critical applications due to vulnerabilities.

o SHA (Secure Hash Algorithm) Family:

o SHA-1: Produces a 160-bit hash digest, less prone to collisions


than MD5.

o SHA-2: Offers longer hash digests (SHA-224, SHA-256, SHA-


348, SHA-512).

o SHA-3: Uses 224-bit to 512-bit hash digests, more secure, 120


rounds of computations.
 RIPEMD (RACE Integrity Primitive Evaluation Message
Digest): Open-source competitor to SHA but less popular.

 HMAC (Hash-based Message Authentication Code): Checks


message integrity and authenticity.

Digital Signatures:
Uses a hash digest encrypted with a private key. The sender hashes the
message and encrypts the hash with their private key. Recipient decrypts
the digital signature using the sender's public key. Verifies integrity of the
message and ensures non-repudiation.

Common Digital Signature Algorithms:

 DSA (Digital Security Algorithm): Utilized for digital signatures.

 RSA (Rivest-Shamir-Adleman): Supports digital signatures,


encryption, and key distribution. Widely used in various applications,
including code signing. Hashes change drastically even with minor
changes in input. Hashing is used to verify data integrity and detect
any changes.

Increasing Hash Security

Common Hashing Attack

Pass the Hash Attack

 A hacking technique that allows the attacker to authenticate to a


remote server or service by using the underlying hash of a user's
password instead of requiring the associated plaintext password.

 Prevention:

o Ensure trusted OS.

o Proper Windows domain trusts.

o Patching.

o Multi-factor authentication.

o Least privilege.

Birthday Attack

 Occurs when two different messages result in the same hash digest
(collision).

Increasing Hash Security:

 Key Stretching
o Technique that is used to mitigate a weaker key by creating
longer, more secure keys (at least 128 bits).

o Used in systems like Wi-Fi Protected Access, Wi-Fi Protected


Access version 2, and Pretty Good Privacy.

 Salting

o Adds random data (salt) to passwords before hashing.

o Ensures distinct hash outputs for the same password due to


different salts.

o Thwarts dictionary attacks, brute-force attacks, and rainbow


tables.

 Nonces (Number Used Once)

o Adds unique, often random numbers to password-based


authentication processes.

o Prevents attackers from reusing stolen authentication data.

o Adds an extra layer of security against replay attacks.

 Limiting Failed Login Attempts

o Restricts the number of incorrect login attempts a user can


make.

o Increases security by deterring attackers attempting to guess


passwords.

o Typically, lock the account after three incorrect attempts.

Public Key Infrastructure (PKI)

PKI Components

 An entire system involving hardware, software, policies, procedures,


and people.

 Facilitates secure data transfer, authentication, and encrypted


communications.

 Used in HTTPS connections on websites.

Establishing a Secure Connection

 User connects to a website via HTTPS.

 Web browser contacts a trusted certificate authority for the web


server's public key.
 A random shared secret key is generated for symmetric encryption.

 The shared secret is securely transmitted using public key


encryption.

 The web server decrypts the shared secret with its private key.

 Both parties use the shared secret for symmetric encryption (e.g.,
AES) to create a secure tunnel.

Security Benefits

 Confidentiality: Data is encrypted using a shared secret.

 Authentication: The web server's identity is verified using its private


key.

Key Escrow

 Storage of cryptographic keys in a secure, third-party location


(escrow).

 Enables key retrieval in cases of key loss or for legal investigations.

 Relevance in PKI:

o In PKI, key escrow ensures that encrypted data is not


permanently inaccessible.

o Useful when individuals or organizations lose access to their


encryption keys.

 Security Concerns:

o Malicious access to escrowed keys could lead to data


decryption.

o Requires stringent security measures and access controls.

Digital Certificates

Digital Certificates

 Digitally signed electronic documents.

 Bind a public key with a user's identity.

 Used for individuals, servers, workstations, or devices.

 Use the X.509 Standard.

 Contains owner's/user's information and certificate authority details.

Types of Digital Certificates


 Wildcard Certificate

o Allows multiple subdomains to use the same certificate.

o Easier management, cost-effective for subdomains.

o Compromise affects all subdomains.

 SAN (Subject Alternate Name) field

o Specifies additional domains and IP addresses supported.

o Used when domain names don’t have the same root domain.

 Single-Sided and Dual-Sided Certificates

o Single-sided: Only requires server validation.

o Dual-sided: Both server and user validate each other.

 Self-Signed Certificates

o Signed by the same entity it certifies.

o Provides encryption but lacks third-party trust.

 Third-Party Certificates

o Issued and signed by trusted certificate authorities (CAs).

o Trusted by browsers and systems.

Key Concepts:

 Root of Trust: Highest level of trust in certificate validation.

 Certificate Authority (CA): Trusted third party that issues digital


certificates.

 Registration Authority (RA): Collects user information for


certificates.

 Certificate Signing Request (CSR): Includes the public key.

 Certificate Revocation List (CRL): List of revoked digital


certificates.

 Online Certificate Status Protocol (OCSP): Determines


certificate revocation status.

 OCSP Stapling: Alternative to OCSP, includes OCSP record in


SSL/TLS handshake.

 Public Key Pinning: Alerts users if a fraudulent certificate is


detected.
 Key Escrow Agents: Securely store copies of private keys.

 Key Recovery Agents: Allows restoration of lost or corrupted keys.

Trust in Digital Certificates:

 Compromised root CAs can impact all issued certificates.

 Commercially trusted CAs are more secure.

 Self-managed CAs must be vigilant against compromises.

Blockchain

Blockchain

 Shared immutable ledger for transactions and asset tracking.

o Builds trust and transparency.

o Each block contains information, including the hash of the


previous block.

o Block Structure:

 Previous block's hash.

 Timestamp.

 Root transactions (hashes of individual transactions).

Public Ledger:

 Secure and anonymous record-keeping system.

 Maintains participants' identities.

 Tracks cryptocurrency balances.

Blockchain Applications:

Smart Contracts:

 Self-executing contracts with code-defined terms.

 Execute actions automatically when conditions are met.

 Transparent, tamper-proof, and trust-enhancing.

Supply Chain Management:

 Transparency and traceability in the supply chain.

 Immutable records of product origin, handling, and distribution.

 Ensures compliance and quality control.


Broad Implications of Blockchain:

 Versatility beyond finance and cryptocurrencies.

 Decentralization eliminates the need for central authorities.

o Immutable ledger ensures data integrity.

o Digital Evolution: Blockchain's impact on technology and


industries.

Encryption Tools

Encryption Tools for Data Security

 TPM (Trusted Platform Module):

o Dedicated microcontroller for hardware-level security.

o Protects digital secrets through integrated cryptographic keys.

o Adds an extra layer of security against software attacks.

 HSM (Hardware Security Module):

o Physical device for safeguarding and managing digital keys.

o Ideal for mission-critical scenarios like financial transactions.

o Ensures key security and regulatory compliance.

 Key Management System:

o Manages, stores, distributes, and retires cryptographic keys.

o Centralized mechanism for key lifecycle management.

o Automates key management tasks in complex environments.

 Secure Enclaves:

o Coprocessor integrated into the main processor of some


devices.

o Isolated from the main processor for secure data processing


and storage.

o Enhances device security by preventing unauthorized access.

Obfuscation

Obfuscation Techniques in Data Security

 Steganography:

o Conceals a message within another to hide its very existence.


o Involves altering image or data elements to embed hidden
information.

o Primary goal is to prevent suspicion of any hidden data.

 Tokenization:

o Substitutes sensitive data with non-sensitive tokens.

o Reduces exposure of sensitive data during transactions.

 Data Masking (Data Obfuscation):

o Disguises original data to protect sensitive information.

o Common in industries handling personal data.

Cryptographic Attacks

Downgrade Attacks:

 Force systems to use weaker or older cryptographic standards or


protocols.

 Exploit known vulnerabilities in outdated versions.

Collision Attacks:

 Find two different inputs producing the same hash output.

 Undermine data integrity verification relying on hash functions.

Quantum Computing Threat:

 Threat to traditional encryption algorithms by rapid factorization of


large prime numbers.

 Post-quantum cryptography aims to create algorithms resistant to


quantum attacks.

o Methods include increasing key size and creating new


cryptographic algorithms.

 NIST selected four post-quantum cryptography standards:

o CRYSTALS-Kyber

o CRYSTALS-Dilithium

o FLACON

o SPHINCS+

You might also like