CISSP-Domain 3-Cryptography Ver 2021
CISSP-Domain 3-Cryptography Ver 2021
• Cryptographic
• Cryptography is the science of secret writing that enables an entity to store transmit data, and process in a form that is only available to an intended recipient
• Cryptography involves scrambling some kind of useful information in its original form, called plaintext, into a garb
led or secret form called ciphertext.
• Cryptography works with XOR binary function
o If both bits are the same the result is Zero
o If they are different the result is One
• Type of Cryptography
o Modern
• Symmetric/Shared key /Private
• Asymmetric
o Classical
• Transposition
• Substitution
• Cryptography today can be said to provide some important security services. The five key services that cryptography can provide are the following:
o Confidentiality
• Confidentiality is a service that ensures keeping information secret from those who are not authorized to have it.
o Integrity
• Cryptography tools cannot prevent a message from being altered, but they can be effective to detect either intentional or acc idental modification of the message.
o Authenticity
• Authenticity can allow a recipient to know positively that transmission of information came from the entity that we expect it from.
• Sometimes referred to as “proof of origin".
o Non-Repudiation
• This is a service that prevents an entity from denying having participated in a previous action.
• Non-repudiation of origin means that the sender cannot deny they sent a particular message.
• Non-repudiation can only be achieved properly through the use of digital signatures.
o Access Control
• Access would only be possible for those individuals who had access to the correct cryptographic keys.
o NOTE:-
Confidentiality is normally achieved by encrypting the message content,
Data integrity is achieved through cryptographic hashing functions,
authenticity is achieved through the use of asymmetric cryptography,
non-repudiation is normally achieved through the use of cryptographic digital signatures, and
access control can be achieved through both symmetric and asymmetric key cryptography but encrypting with keys that allow the recipient to d ecrypt with the proper keys.
• Type of Cryptographic
o There are three primary types of modern encryption
Symmetric
▪ Symmetric encryption uses one key: the same key encrypts and decrypts.
Asymmetric
▪ Asymmetric cryptography uses two keys: if you encrypt with one key, you may decrypt with the other
Hashing
▪ Hashing is a one-way cryptographic transformation using an algorithm (and no key).
o Symmetric Cryptography
• Symmetric encryption uses one key to encrypt and decrypt
• Symmetric encryption is also called “Secret key” encryption: the key must be kept secret from third parties.
• Strengths include speed and cryptographic strength per bit of key.
• The major weakness is that the key must be securely shared before two parties may communicate securely.
• Symmetric keys are often shared via an out-of-band method and face-to-face discussion.
• Advantage
▪ Fast, Secure, Confidentiality
• Disadvantage
▪ Key management is difficult
▪ Not able to provide non-repudiation of origin, access control, & digital signatures.
▪ Requires both sender & receiver to share the same key.
• Symmetric encryption may have Stream and Block Ciphers modes.
▪ Stream Modes means each bit is independently encrypted in a Stream.
▪ Block mode ciphers encrypt blocks of data each round:
• 64 bits for the Data Encryption Standard (DES)
• 128 bits for AES
• Initialization Vectors
▪ Initialization Vectors ( IV )
• Initialization vector is used in some symmetric ciphers to ensure that the first encrypted block of data is random. This ensures that identical plaintexts encrypt to different
ciphertexts.
• Modes Of Block Cipher
▪ A block-based cipher is subject to the problems of latency, or delay, in processing
▪ Data Encryption Standard ( DES )
• DES Developed by IBM, key size 64 bit, effective key size is 56 bit (8 -bit parity value) block size is also 64.
• Performs 16 rounds of operations ( XOR).
• Mode of DES
• Electronic Code Book (ECB)
• Cipher Block Chaining (CBC)
• Cipher Feedback (CFB)
• Output Feedback (OFB)
• Counter (CTR) Mode
• Electronic Code Book (ECB)
• The simplest of the encryption modes is the electronic codebook (ECB) mode
• Counter (CTR)
• Nonce is a random value, Counter is incremental
• Nonce + Counter = Keystream XORed with Plaintext Key = Ciphertext
• CTR mode is typically used in highspeed applications ( IPSec & ATM )
▪ Double DES
• Double DES is an encryption technique that uses two instances of DES on same plain text
• Double DES overall key size is 64*2, Effective key size 56*2
• The primary complaint about DES was that key is too short.
• 2DES multiply - key size (64x2), effective key size (56x2 = 112bit), and round of operations (16x2)
• Double DES is vulnerable for Meet-in-the-Middle Attack ( MITM)
• Meet-in-the-Middle Attack ( MITM) the objective is to find the key.
▪ Triple DES
• Triple DES is an encryption technique that uses three instances of DES on same plain text.
• Triple DES overall key size is 64*3, Effective key size 56*3
• 3DES triple - key size (64x3), effective key size (56x3 = 168bit) and round of operations (16x3)
• Effective rendered a key with a 168-bit Strength
• Encrypts message three times with Multiple Keys
• DES-EEE3 uses three keys for encryption
• DES-EDE3 uses 3 keys , encrypts ,decrypts & encrypts data
• DES-EEE2, DES-EDE2 is the same as the previous mode, but the first and third operation uses the same key.
▪ Remember for the exam SSL ( DES) TLS ( AES)
Symmetric Algorithms
Strength Name Key Size
Weak RC2 -40 40
DES 56
RC5-64/16/7 56
Medium RC5-64/16/10 80
Skipjack 80
Strong RC2-128 128
RC5-64/12/16 128
IDEA 128
Blowfish 128
3DES 168
Very Strong RC5-64/12/32 256
Twofish 256
RC6 256
Rijndael 256
• RC5
▪ In cryptography, RC5 is a symmetric-key block cipher notable for its simplicity.
▪ Designed by Ronald Rivest in 1994, RC stands for "Rivest Cipher", or "Ron's Code" (compare RC2 and RC4).
▪ The Advanced Encryption Standard (AES) candidate RC6 was based on RC5.
▪ Remember RC4 is a Stream and RC5 is a Block
▪ Key for RC5 can be from 0 to 2040 bits
▪ Number of rounds that it executes can be adjusted from 0 to 255
▪ Algorithm operates on two words at a time in a fast and secure manner.
o Asymmetric Cryptography
• Asymmetric algorithms are one-way functions, that is, a process that is much simpler to go in one direction, the forward direction, than to go in the other direction, the backward
direction
• Asymmetric encryption uses two keys: if you encrypt with one key, you may decrypt with the other. One key may be made public (called the public key); asymmetric encryption
is also called public-key encryption for this reason.
• Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) are two different things.
o AES is a block cipher providing a symmetric-key algorithm, while ECC is a field of cryptography (utilizing the algebraic structure of elliptic curves over finite fields) providing an
asymmetric-key algorithm.
o A strong configuration for a cryptographic protocol such as TLS might use ECC for key-exchange, AES for the cipher, and SHA-2 for message authentication.
• Quantum Cryptography
o Quantum cryptography, on the other hand, uses physics to secure data
o Quantum cryptography, also known as quantum key distribution, is built on quantum physics
o Quantum cryptography is a set of protocols, systems, and procedures by which it is possible to create and distribute secret keys.
o It is important to note that quantum cryptography is not used to encrypt data, transfer encrypted data, or store encrypted data.
o Quantum cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with complete security, as dictated via
the laws of physics
o It's faster than Asymmetric.
o Used in Fiber optic light as a frequency to exchange data, calculation they use physical than matics , faster key distribution algorithm.
• Digital Signature
o A digital signature can provide several assurances. It will assure that the message does indeed come from the person who claims to have sent it, it has not been altered, both
parties have a copy of the same document, the person sending the document cannot claim they did not send it, and the person receiving it cannot claim they have received a
different message
o Digital signature is a block of data produced by hashing the message with a hashing algorithm that produces a message digest that is generated based on the contents of the
message.
o A Digital Certificate is an electronic document that asserts authenticity & data integrity that is tied to sender.
o Digital Signature Non-Repudiation Determine the information source by signing a hash or any other data with a private key. If it is possible to decrypt the information with the
sender's public key, the sender has been verified, thus resulting in non-repudiation. Non-repudiation exists when the sender cannot deny his or her association with data
transmission.
PAIN
▪ Privacy: Receiver's Public Key
• Encryption is used to ensure confidentiality
▪ Authenticity: Sender's Private Key
• Digital Certificates are used for authentication
▪ Integrity: (Not Asymmetric Or Symmetric)
• Hashing is used to prove integrity.
▪ NON-Repudiation: Hash Encrypted Sender's Private Key.
o Attacks On Cryptosystem
• Intention is to break a cryptosystem and find the plaintext from the ciphertext. The attacker’s objective is to identify the key.
• The true strength of cryptosystem is the size and secrecy of the key
• Kirchhoff's law - A Cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
• Segregation of Duties: A cross-check to ensure that misuse and abuse of assets due to innocent mistake or malicious intent can be efficiently detected and prevented
• Cryptanalysis
▪ Cryptanalysis is the process of reverse engineering cryptography algorithms.
▪ The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services
• Linear Cryptanalysis - A known-plaintext attack and uses a linear approximation to describe the behavior of the block cipher. Known plaintext attack that at tempts to
discover the crypto key by comparing the plain text and the ciphertext pairs that were created with the same key - The attacker will run large amounts of information
through the linear cryptanalysis to increase the probability of finding the correct encryption key.
• Differential Cryptanalysis - Also called a side-channel attack, this more complex attack is executed by measuring the exact execution times and power required by the
crypto device to perform the encryption or decryption. By measuring this, it is possible to determine the value of the key an d the algorithm used.
• Statistical attacks
▪ A Statistical attack focuses on the flaws in the statistical patterns of the algorithm
▪ Statistical attack targets the design of the cryptographic algorithm such as floating-point errors and the inability to create true Ramon numbers
▪ Finding these flaws can statistically reduce the amount of time it takes to find the cryptographic
• Reply Attack
▪ This attack is meant to disrupt and damage processing by the attacker, through the resending of repeated files or input to the host.
▪ If there are no checks such as time-stamping, use of one-time tokens, or sequence verification codes in the receiving software, the system might process the duplicate file.