Module 7 - Cryptography and the Public Key Infrastructure
Module 7 - Cryptography and the Public Key Infrastructure
ASSURANCE &
SECURITY 2
MODULE 7
CRYPTOGRAPHY AND THE PUBLIC
KEY INFRASTRUCTURE
OBJECTIVES
Upon completion of this module, the student would be able to:
➢ Use tools to encrypt and decrypt data.
➢ Use cryptography to secure communications.
➢ Explain the role of cryptography in ensuring the integrity and authenticity of
data.
➢ Explain how cryptographic approaches enhance data confidentiality.
OBJECTIVES
Upon completion of this module, the student would be able to:
➢ Explain how the public key infrastructure (PKI) supports network security.
➢ Explain public key cryptography.
➢ Explain how the public key infrastructure functions.
➢ Explain how the use of cryptography affects cybersecurity operations.
CRYPTOGRAPHY
What is Cryptography?
Securing Communications
▪ Information security concerns
protecting network infrastructure
devices and securing data as it
travels on the network.
▪ Cryptography helps realize the four
objectives of information security:
• Data Confidentiality - only authorized
users can read the data.
• Data Integrity - the data has not been
altered by unauthorized parties.
• Origin authentication - the data has
actually originated at the expected
source.
• Non-repudiation – the integrity of the
message is irrefutable by the sender.
What is Cryptography?
Cryptology
▪ Cryptology is the science of making and
breaking secret codes. There are two
disciplines:
• Cryptography –This is the development and
use of codes that are used for communicating
privately. Specifically, it is the practice and study
of techniques to secure communications.
• Cryptanalysis – This is the breaking of those
codes. Specifically, it is the practice and study of
determining and exploiting weaknesses in
cryptographic techniques.
What is Cryptography?
Cryptography – Ciphers
▪ A cipher is an algorithm that consists of a series of well-defined steps that can be
followed as a procedure when encrypting and decrypting messages.
▪ The following are types of ciphers that have
been used over the years:
• Substitution cipher – Substitution ciphers retain the
letter frequency of the original message.
• Transposition cipher - In transposition ciphers, no
letters are replaced; they are simply rearranged.
• Polyalphabetic ciphers - Polyalphabetic ciphers are
based on substitution, using multiple substitution
alphabets.
What is Cryptography?
Cryptanalysis – Code Breaking
▪ A number of code breaking (cryptanalysis) methods exist, such as brute-force,
ciphertext, and known-plaintext, among others.
Well-known symmetric encryption algorithms include: Data Encryption Standard (DES), 3DES
(Triple DES), Advanced Encryption Standard, (AES) Software-Optimized Encryption Algorithm
(SEAL), Rivest ciphers (RC)
Confidentiality
Asymmetric Encryption Algorithms
▪ Asymmetric algorithms, also called public-key algorithms, are designed so that the key that is used
for encryption is different from the key that is used for decryption.
▪ The decryption key cannot, in any reasonable amount of time, be calculated from the encryption
key and vice versa.
▪ Asymmetric algorithms use a public key and a private key.
▪ Both keys are capable of the encryption process, but the complementary paired key is required for
decryption.
▪ The process is also reversible in that data encrypted with the public key requires the private key to
decrypt.
▪ This process enables asymmetric algorithms to achieve confidentiality, authentication, and integrity.
Confidentiality
Asymmetric Encryption – Confidentiality
▪ Asymmetric algorithms are used to
provide confidentiality without pre-
sharing a password.
▪ The confidentiality objective of
asymmetric algorithms is initiated when
the encryption process is started with
the public key.
The process can be summarized using the
formula: Public Key (Encrypt) + Private
Key (Decrypt) = Confidentiality
• When the public key is used to encrypt the
data, the private key must be used to
decrypt the data.
• Only one host has the private key.
Confidentiality
Asymmetric Encryption – Authentication
▪ The authentication objective of asymmetric algorithms is
initiated with the private key encryption process.
The process can be summarized using the formula
▪ Private Key (Encrypt) + Public Key (Decrypt) =
Authentication
▪ When the private key is used to encrypt the data, the
corresponding public key must be used to decrypt the
data.
▪ Because only one host has the private key, only that host
could have encrypted the message, providing
authentication of the sender.
▪ When a host successfully decrypts a message using a
public key, it is trusted that the private key encrypted the
message, which verifies the sender.
Confidentiality
Asymmetric Encryption – Integrity
▪ Combining the two asymmetric encryption processes provides message
confidentiality, authentication, and integrity.
Confidentiality
Diffie-Hellman
▪ Diffie-Hellman (DH) is an asymmetric
mathematical algorithm that allows two
computers to generate an identical shared secret
without having communicated before.
▪ The new shared key is never actually exchanged
between the sender and receiver.
▪ However, because both parties know it, the key
can be used by an encryption algorithm to encrypt
traffic between the two systems.
▪ The security of DH is based on the fact that it uses
unbelievably large numbers in its calculations.
▪ Unfortunately, asymmetric key systems are
extremely slow for any sort of bulk encryption.
This is why it is common to encrypt the bulk of the
traffic using a symmetric algorithm.
PUBLIC KEY INFRASTRUCTURE
Public Key Cryptography
Using Digital Signatures
▪ Digital signatures are a mathematical technique used to provide
authenticity, integrity, and nonrepudiation in the form of code
signing and digital certificates.
▪ Digital signatures are commonly used in the following two situations:
• Code signing –Code signing is used to verify the integrity of executable files
downloaded from a vendor website.
• Digital certificates – These are used to authenticate the identity of a system
and exchange confidential data.
▪ There are three Digital Signature Standard (DSS) algorithms used for
generating and verifying digital signatures:
• Digital Signature Algorithm (DSA)
• Rivest-Shamir Adelman Algorithm (RSA)
• Elliptic Curve Digital Signature Algorithm (ECDSA)
Public Key Cryptography
Digital Signatures for Code Signing
▪ Digital signatures are commonly used to provide assurance of
the authenticity and integrity of software code.
▪ Executable files are wrapped in a digitally signed envelope,
which allows the end user to verify the signature before
installing the software.
▪ Digitally signing code provides several assurances about the
code:
• The code is authentic and is actually sourced by the publisher.
• The code has not been modified since it left the software publisher.
• The publisher undeniably published the code. This provides
nonrepudiation of the act of publishing.
Public Key Cryptography
Digital Signatures for Digital Certificates
▪ A digital certificate enables users, hosts,
and organizations to securely exchange
information over the Internet.
▪ Specifically, a digital certificate is used to
authenticate and verify that users
sending a message are who they claim to
be.
▪ Digital certificates can also be used to
provide confidentiality for the receiver
with the means to encrypt a reply.
Authorities and the PKI Trust System
Public Key Management
▪ When establishing an asymmetric connection between two hosts, the hosts will exchange their public key
information.
▪ Trusted third parties on the Internet validate the authenticity of these public keys using digital certificates.
The third party issues credentials that are difficult to forge.
▪ From that point forward, all individuals who trust the third party simply accept the credentials that the third
party issues.
• Emmett Dulaney and Chuck Easttom. CompTIA Security+ Study Guide: Exam SY0-501 7th Edition
• David L. Prowse (2018) Pearson. CompTIA Security+ SY0-501 Cert Guide (4th Edition)
• Omar Santos/ Joseph Muniz /Stefano De Crescenzo(June 17, 2017)CCNA Cyber Ops (SECFND #210-
250 and SECOPS #210-255)Official Cert Guide Library 1st Edition