ccna security v2.0 chapter 7: cryptographic systems

88
CCNA Security v2.0 Chapter 7: Cryptographic Systems

Upload: joel-oliver

Post on 13-Jan-2016

494 views

Category:

Documents


37 download

TRANSCRIPT

Page 1: CCNA Security v2.0 Chapter 7: Cryptographic Systems

CCNA Security v2.0

Chapter 7:

Cryptographic Systems

Page 2: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

Chapter Outline

7.0 Introduction

7.1 Cryptographic Services

7.2 Basic Integrity and Authenticity

7.3 Confidentiality

7.4 Public Key Cryptography

7.5 Summary

Page 3: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3

Section 7.1:Cryptographic Services

Upon completion of this section, you should be able to:

• Explain the requirements of secure communications including integrity, authentication, and confidentiality.

• Explain cryptography.

• Describe cryptoanalysis.

• Describe cryptology.

Page 4: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4

Topic 7.1.1:Securing Communications

Page 5: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

Authentication, Integrity, and Confidentiality

Page 6: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

Authentication

Page 7: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

Data Integrity

Page 8: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

Data Confidentiality

Page 9: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9

Topic 7.1.2:Cryptography

Page 10: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

Creating Ciphertext

Ciphertext can be creating using several methods:

• Transposition

• Substitution

• One-time pad

Page 11: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

Transposition Ciphers

Page 12: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

Substitution Ciphers

xxxx

Page 13: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

One-Time Pad Ciphers

Page 14: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 14

Topic 7.1.3:Cryptanalysis

Page 15: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15

Cracking Code

Page 16: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Methods for Cracking Code

Methods used for cryptanalysis:

• Brute-force method

• Ciphertext method

• Known-Plaintext method

• Chosen-Plaintext method

• Chosen-Ciphertext method

• Meet-in-the-Middle method

Page 17: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

Methods for Cracking Code

Frequency Analysis of the English Alphabet

Deciphering Using Frequency Analysis

Page 18: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 18

Topic 7.1.4:Cryptology

Page 19: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19

Making and Breaking Secret Codes

Page 20: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20

Cryptanalysis

Page 21: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21

The Secret is in the Keys

Page 22: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22

Section 7.2:Basic Integrity and Authenticity

Upon completion of the section, you should be able to:

• Describe the purpose of cryptographic hashes.

• Explain how MD5 and SHA-1 are used to secure data communications.

• Describe authenticity with HMAC.

• Describe the components of key management.

Page 23: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23

Topic 7.2.1:Cryptographic Hashes

Page 24: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24

Cryptographic Hash Function

Page 25: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25

Cryptographic Hash Function Properties

Page 26: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26

Well-Known Hash Functions

Page 27: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 27

Topic 7.2.2:Integrity with MD5, SHA-1, and SHA-2

Page 28: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28

Message Digest 5 Algorithm

Page 29: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29

Secure Hash Algorithm

Page 30: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30

MD5 Versus SHA

Page 31: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 31

Topic 7.2.3:Authenticity with HMAC

Page 32: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32

Keyed-Hash Message Authentication Code

Page 33: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33

HMAC Operation

Page 34: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34

Hashing in Cisco Products

Page 35: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35

Topic 7.2.4:Key Management

Page 36: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36

Characteristics of Key Management

Page 37: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37

Key Length and Keyspace

Page 38: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38

The Keyspace

Page 39: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39

Types of Cryptographic Keys

Types of cryptographic keys:

• Symmetric keys

• Asymmetric keys

• Digital signatures

• Hash keys

Page 40: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40

Choosing Cryptographic Keys

Page 41: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41

Section 7.3:Confidentiality

Upon completion of the section, you should be able to:

• Explain how encryption algorithms provide confidentiality.

• Explain the function of the DES, 3DES, and the AES algorithms .

• Describe the function of the Software Encrypted Algorithm (SEAL) and the Rivest ciphers (RC) algorithms.

Page 42: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42

Topic 7.3.1:Encryption

Page 43: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43

Two Classes of Encryption Algorithms

Page 44: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44

Symmetric and Asymmetric Encryption

Page 45: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45

Symmetric Encryption

Page 46: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46

Symmetric Block Ciphers and Stream Ciphers

Page 47: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47

Choosing an Encryption Algorithm

Page 48: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 48

Topic 7.3.2:Data Encryption Standard

Page 49: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49

DES Symmetric Encryption

Page 50: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50

DES Summary

Page 51: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51

Improving DES with 3DES

Page 52: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52

3DES Operation

Page 53: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53

AES Origins

Page 54: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54

AES Summary

Page 55: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 55

Topic 7.3.3:Alternate Encryption Algorithms

Page 56: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56

Software-Optimized Encryption Algorithm (SEAL)

SEAL has several restrictions:

• The Cisco router and the peer must support IPsec.

• The Cisco router and the other peer must run an IOS image that supports encryption.

• The router and the peer must not have hardware IPsec encryption.

Page 57: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57

RC Algorithms

Page 58: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 58

Topic 7.3.4:Diffie-Hellman Key Exchange

Page 59: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59

Diffie-Hellman (DH) Algorithm

Page 60: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60

DH Operation

Page 61: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61

Section 7.4:Public Key Cryptography

Upon completion of the section, you should be able to:

• Explain the differences between symmetric and asymmetric encryptions and their intended applications.

• Explain the functionality of digital signatures.

• Explain the principles of a public key infrastructure (PKI).

Page 62: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 62

Topic 7.4.1:Symmetric Versus Asymmetric Encryption

Page 63: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63

Asymmetric Key Algorithms

Four protocols that use asymmetric key algorithms:

• Internet Key Exchange (IKE)

• Secure Socket Layer (SSL)

• Secure Shell (SSH)

• Pretty Good Privacy (PGP)

Page 64: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64

Public Key + Private Key = Confidentiality

Page 65: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65

Private Key + Public Key = Authenticity

Page 66: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66

Asymmetric AlgorithmsPlease use all 4Figs from this page with the Graphic titles as they tell a story. It may require 2 slides.

Alice Encrypts Message Using Bob’s Public Key

Alice Encrypts A Hash Using Bob’s Public Key

Page 67: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67

Asymmetric AlgorithmsBob Uses Alice’s Public Key to Decrypt Hash

Bob Uses His Public Key to Decrypt Message

Page 68: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68

Types of Asymmetric Algorithms

Page 69: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 69

Topic 7.4.2:Digital Signatures

Page 70: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70

Using Digital Signatures

Digital Signature Properties:

• Signature is authentic

• Signature is unalterable

• Signature is not reusable

• Signature cannot be repudiated

Page 71: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71

Code Signing

Digitally signing code provides several assurances about the code:

• The code is authentic and is actually sourced by the publisher.

• The code has not been modified since it left the software publisher.

• The publisher undeniably published the code.

Page 72: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72

Digital Certificates

Page 73: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73

Using Digital Certificates

Sending a Digital Certificate

Receiving a Digital Certificate

Page 74: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74

Digital Signature Algorithms

DSA Scorecard

RSA Scorecard

Page 75: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 75

Topic 7.4.3:Public Key Infrastructure

Page 76: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76

Public Key Infrastructure Overview

Page 77: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77

PKI Framework

PKI Example

Elements of the PKI Framework

Page 78: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78

Certificate Authorities

Page 79: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79

Interoperability of Different PKI Vendors

Page 80: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80

Public-Key Cryptography Standards

Page 81: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 81

Simple Certificate Enrollment Protocol

Page 82: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82

PKI Topologies

Hierarchical CA

Cross Certified CA

Single-Root PKI Topology

Page 83: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83

Registration Authority

Page 84: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84

Digital Certificates and CAs

Retrieving CA Certificates

Submitting Certificate Requests to the CA

Page 85: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 85

Digital Certificates and CAs

Peers Authenticate Each Other

Page 86: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86

Section 7.5:Summary

Chapter Objectives:

• Explain the areas of cryptology.

• Explain to two kinds of encryption algorithms.

Page 87: CCNA Security v2.0 Chapter 7: Cryptographic Systems

Thank you.

Page 88: CCNA Security v2.0 Chapter 7: Cryptographic Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88

Instructor Resources

• Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com)

• These resources cover a variety of topics including navigation, assessments, and assignments.

• A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes.

1

2