-
History
-
evolution
-
substitution cipher
-
monoalphabetic
- sytale
- athash
- caesar
-
polyalphabetic
- de vignere
- transposition cipher
- kerckhoffs principle
-
one time pad
-
vernam
- XOR
- enigma, IBM lucifer
-
definitions
-
cryptosystem
- software
- protocol
- algorithm
- keys, keyspace
-
strength
- workfactor
- keycluster
-
kdf
- masterkey
- subkey
- cryptanalysis
-
services
- confidentiality, integrity, authentication, authorisation, nonrepudiation
-
other methods
- running cipher
- concealment cipher
-
steganography
-
components
- carrier, stegomedium, payload
-
Systems
-
symmetric
- notation
- pros and cons
-
block ciphers
- pros and cons
-
confusion
- s-box
-
diffusion
- avalanche effect
-
stream ciphers
- keystream generator
-
strong stream characteristics
- long periods of no repeating patterns within keystream values
- statistically unpredictable keystream
- no lnear relationship between key and keystream
- statistically unbiased keystreams
- initialisation vector
-
other techniques
- compression
- expansion
- key mixing
- padding
-
types
-
DES
- modes
- ECB
- CBC
- CFB
- blocks smaller than 64bits
- OFB
- for video
- CTR
- no chaining, high performance
-
3DES
- modes
- DES-EEE3
- DES-EDE3
- DES-EEE2
- DES-EDE2
-
AES
- Rijndael
- RC4, RC5, RC6
- Blowfish
-
asymmetric
- pros and cons
- zero knowledge proof
-
types
-
Diffie-Hellmann
- man-in-in-the-middle attack
- authenticated DH with DS
- STS
- key agreement
-
RSA
- key exchange protocol
- one way function
- trapdoor
- El Gamal
- Elliptic Curve Function
-
hybrid
- public key cryptography
-
digital envelope
- session keys
-
Message Integrity
-
one way hash
- man-in-the-middle vulnerability
-
MACs
- HMAC
-
CBC-MAC
- data origin authentication
- CMAC
-
Hashing algorithms
- MD2, MD4, MD5
- SHA Family
- birthday attack
-
Digital Signatures
- DSS
-
PKI and Key Mgt
-
PKI Components
-
CA
-
trust relationship
- cross certification
- RA
- Repository
-
CRS
- CRL
- OCSF
- Timestamping system
- key mgt
- client software
-
certificates
- X.509
- contents
- PKI Steps
-
Key management
-
rules for key mgt
- key length
- secure storage and transmission
- random keys derived from the full spectrum of keyspace
- key lifetime dependent on sensitity
- frequent usage should result in shorter key lifespan
- key backup and escrow
- proper disposal of key after lifetime
- key escrow
- multiparty key recovery
-
Usage
-
transmission
-
link encryption
-
physical-DL layer
- advantage over E2E
-
PPTP
- dl layer
-
SSL/TLS
- transport layer
-
E2E
- application layer
-
IPSEC
- nework layer
-
modes
- Transport
- tunnel
- includes IP headers
-
protocols
- ESP
- ICV
- AH
-
IKE
- ISAKMP
- OAKLEY
-
SA
- SPI
-
Applications
-
E-mail
-
PGP
- Key ring
- web of trust
-
S/MIME
- PKCS
-
Internet
- SHTTP
- HTTPS
-
SET
- entities
- cookies
-
Trusted Platform Management
-
uses
- binding
- sealing
-
segments
-
persistent memory
- endorsement key
- storage root key
-
versatile memory
- Attestation identity key
- Platform config register hash
- storage keys
-
Attacks
- frequency analysis
-
passive
- eavesdropping
-
active
- modifying
- masquerading
-
common types
- known plaintext
- chosen plaintext
- chosen ciphertext
- differential cryptanalysis
- linear cryptanalysis
- side channel
- replay attack
- algebraic
- analytic
- social engineering
- meet-in-the-middle