CISSP Domain 3 - 46 60
CISSP Domain 3 - 46 60
CISSP Domain 3 - 46 60
• Frequently used for handheld devices due to their limited processing capability
• Solving this problem is harder than solving discrete logarithms, so algorithms based on Elliptic Curve
Cryptography (ECC) are much stronger per bit than systems using discrete logarithms (and also stronger than
factoring prime numbers)
• Requires less computational resources because shorter keys can be used compared to other asymmetric
methods
• RSA 1,024 bits, DSA 1,024 bits, Elliptic curve 160 bits
REVIEW SYMMETRIC VS. ASYMMETRIC
Symmetric:
• Fast
• Out of band key exchange
• No integrity, authenticity or authenticity
• Not Scalable
Asymmetric:
• Slow
• Scales to large organizations well
• Provides non-repudiation
• Key exchange does not require exchange of any secret information
SSL/TLS HYBRID CRYPTOGRAPHY
INTEGRITY
• MAC: Provides reasonable authenticity and integrity not strong enough to be non-repudiation
(because it uses a symmetric key)
• Digital Signatures: Can detect both malicious and accidental modification, but requires an overhead.
Provides true non-repudiation
HASHING
• Hashing is the Digital representation of the contents of the file
• When two different documents produce the same hash it is called a collision
• A birthday attack is an attempt to cause collisions. It is based on the idea that it is easier to find two
hashes that happen to match than to produce a specific hash.
HASHING ALGORITHMS
• Older hash functions include Secure Hash Algorithm 1 (SHA-1), which creates a 160-bit hash and
Message Digest 5 (MD5), which creates a 128-bit hash
MD5
• Message Digest algorithm 5, created by Ronald Rivest
• Creates a 128-bit hash value based on any input length
• Weaknesses have been discovered where collisions could be found in a practical amount of time
• MD6 is the newest version of the MD family of hash algorithms, first published in 2008
• The cryptographic salt is a random value that is added to the end of the password before the operating
system hashes the password. The salt is then stored in the password file along with the hash.
• When the operating system wishes to compare a user’s proffered password to the password file, it first
retrieves the salt and appends it to the password.
• It feeds the concatenated value to the hash function and compares the resulting hash with the one
stored in the password file.
• Specialized password hashing functions, such as PBKDF2, bcrypt and scrypt allow for the creation of
hashes using salts
• Provide nonrepudiation, which includes authentication of the identity of the signer, and proof of
the document’s integrity (proving the document did not change)
• Digital signatures provide authentication and integrity, which forms nonrepudiation. They do not
provide confidentiality: the plaintext remains unencrypted.
• Message is hashed.
• RSA is the asymmetric encryption algorithm that encrypts the hash with the sender’s private key.
DIGITAL SIGNATURE
WHAT PREVENTS MITM ATTACKS
• Authentication
• Two parties must preshared secret key (such as a DES key). Once shared, the sender may
generate a HMAC by hashing the message with an algorithm such as MD5 or SHA-1, and
then encrypting the hash with the preshared key via symmetric cipher such as DES
• The receiver hashes the plaintext locally and also decrypts the HMAC with his/her copy of
the private key, recovering the sender’s hash. If the two hashes match, the sender is
authenticated, and the message’s integrity is assured.
PKI (PUBLIC KEY INFRASTRUCTURE)
• If the two are used together, they provide mutual authentication and
encryption.