1757 Reading
1757 Reading
What is Encryption? 2
Encryption Methods 3
Authentication 8
Summary 18
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -1-
Reading: Apply encryption to network and system security
What is Encryption?
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -2-
Reading: Apply encryption to network and system security
Encryption Methods
For example you are given a coded message on a piece of paper. To read it
you need to know how it was coded. It may use a simple method of
substituting numbers for letters but to decipher the message you need to
know what letter equates to what number. This is the 'key' that will unlock
the code.
Computer systems encrypt information the same way but use more
sophisticated and complicated codes. Consider the following diagram:
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -3-
Reading: Apply encryption to network and system security
The algorithm may work in both directions meaning that information can be
encrypted and decrypted with the correct keys. Knowing any three items
will allow you to derive the fourth. However encryption methods are
designed to make discovering keys and algorithms extremely difficult.
Ciphering
Ciphering is the process of how data or the original information is converted
into cipher text. The process uses algorithms and encryption processes, but
more specifically this refers to how the raw data is managed. There are
generally two cipher methods.
Stream cipher is a relatively simple method where each bit of data
in the original information is sequentially encrypted using one bit of
the key. If the key is of a fixed length it may be possible to
mathematically deduce the key by analysing the cipher text. Using a
variable length key or continually changing the key in the stream
cipher process can theoretically produce an unbreakable encryption
system. One-Time pad is the process of continually varying the
encryption key with random numbers. This method is not
commonly used because of overheads and encrypting efficiency.
Block cipher encrypts the original information into chunks.
Depending upon the encryption system, the size of these chunks or
blocks will be fixed. Each block is processed by an algorithm and
key to produce blocks of cipher text. These cipher text blocks can
be further used with encryption keys to strengthen the encryption.
Block cipher processes more data than stream cipher on each pass
and is more commonly used today.
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -4-
Reading: Apply encryption to network and system security
cipher text must use the same key to decipher that was used to encrypt the
data.
The security of data using this method depends upon the security of the key.
Only authorised people and systems should have the key. It should be kept
private and secret. If anyone else knows the key, the security of the data is
compromised and all data should be encrypted using a new key. The new
key needs to be distributed to all authorised people and systems. This may
present operational difficulties if the locations are geographically diverse,
distant and many.
For more information on each of these systems, go online and search for
each term through your preferred search engine (such as Google:
www.google.com).
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -5-
Reading: Apply encryption to network and system security
Information encrypted with the public key can only be decrypted using the
private key of the key pair. Therefore only the owner of the private key can
decipher the information. The public key used to encrypt will not decrypt
the cipher text it produces. It's a one way process. Public keys are used to
encrypt and private keys are used to decrypt. Information encrypted with the
private key can be decrypted using the public key for authentication
purposes (using 'digital signatures' - this is discussed later).
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -6-
Reading: Apply encryption to network and system security
For more information on each of these systems, go online and search for
each term through your preferred search engine (such as Google:
www.google.com).
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -7-
Reading: Apply encryption to network and system security
Authentication
Digital Signatures
Using public key or asymmetrical encryption, information such as
messages, documents, files etc. are encrypted using a public key and
decrypted using the private key of a key pair. The public key is not secret
and freely available so anyone could have encrypted the original data or
information.
The originator can authenticate their data by using their private key. This is
done by using the originator's private key to encrypt information about the
original data (usually checksum information). This encrypted information is
kept with or appended to the original data. This is known as a digital
signature.
This digital signature can only be decrypted using the user's public key. If
decryption of the information (the digital signature) is successful and
compares correctly with that data being accessed (checksum, etc) we can be
reasonably confident of the originator's identity and that the data has not
been modified since the digital signature was added. This is most useful
when downloading data from the internet.
Digital Certificates
Public key encryption works using pairs of keys. Anyone wishing to send
an encrypted message must use the recipient's public key to encrypt the
message. If the recipient of the message wishes to verify the digital
signature they must use the sender's public key. Where do we find these
keys and how can we be sure that we are using the correct key of a pair?
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -8-
Reading: Apply encryption to network and system security
654302934.doc
© State of New South Wales, Department of Education and Training 2006 -9-
Reading: Apply encryption to network and system security
Who is using PKI in Australia? To find out more, go online and search for
the phrase 'Users of PKI Australia' through your preferred search engine
(such as Google: www.google.com).
Kerberos
Kerberos is an authentication protocol that uses secret-key encryption to
verify client identity and exchange information securely.
Reflect: Kerberos
Find out more about who uses Kerberos. Use your preferred search engine
(for example Google: www.google.com.au) to search for information about
which products use Kerebos. Does Windows use it? What about Eudora or
SAP?
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 10 -
Reading: Apply encryption to network and system security
There are a number of methods that use encryption to ensure that data
transmission on a network is secure.
For more information, go online and search for the term 'IPSec' through
your preferred search engine (such as Google: www.google.com). You
could also try the NetBSD project website (www.netbsd.org - enter 'IPSec'
in the search tool and find the 'IPSec FAQ' document).
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 11 -
Reading: Apply encryption to network and system security
The main functions provided by VPNs are tunneling, data security, data
integrity and authentication. This is usually provided by a number of
protocols, IPSec, PPTP and L2TP.
URLs prefixed with 'HTTPS' initiate an SSL session between the web
browser and web server. Most online banking facilities will direct you to a
secure site with 'HTTPS' at the beginning of the address.
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 12 -
Reading: Apply encryption to network and system security
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 13 -
Reading: Apply encryption to network and system security
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 14 -
Reading: Apply encryption to network and system security
Brute force attacks will eventually succeed if enough time and resources are
used. For example, it took 312 hours using 3,500 computers to find a RC5
key. (RC5 is a block cipher method that uses 64bit symmetric keys) A key
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 15 -
Reading: Apply encryption to network and system security
is considered strong if the cost of finding the key outweighs the cost of the
data being protected.
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 16 -
Reading: Apply encryption to network and system security
Third party encryption solutions are usually built on industry standards and
generally operate independent of any operating system or devices. These
solutions can be expensive.
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 17 -
Reading: Apply encryption to network and system security
Summary
654302934.doc
© State of New South Wales, Department of Education and Training 2006 - 18 -