cryptography cissp guide to security essentials chapter 5

67
Cryptography CISSP Guide to Security Essentials Chapter 5

Upload: della-sims

Post on 28-Dec-2015

251 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Cryptography CISSP Guide to Security Essentials Chapter 5

Cryptography

CISSP Guide to Security Essentials

Chapter 5

Page 2: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 2

Objectives

• Applications and uses of cryptography

• Encryption methodologies

• Cryptanalysis

• Management of cryptography

• Key management

Page 3: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 3

What Is Cryptography

• Cryptography is the science of hiding information in plain sight, in order to conceal it from unauthorized parties.– Substitution cipher first used by Caesar

for battlefield communications

Page 4: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 4

Encryption Terms and Operations

• Plaintext – an original message

• Ciphertext – an encrypted message

• Encryption – the process of transforming plaintext into ciphertext (also encipher)

Page 5: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 5

Encryption Terms and Operations (cont.)

• Decryption – the process of transforming ciphertext into plaintext (also decipher)

• Encryption key – the text value required to encrypt and decrypt data

Page 6: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 6

Methods of Encryption

• Substitution

• Transposition

• Monoalphabetic

• Polyalphabetic

• Running-key

• One time pads

Page 7: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 7

Types of Encryption

• Block cipher

• Stream cipher

Page 8: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 8

Types of Encryption Keys

• Symmetric key– A common secret that all parties

who participate must know

• Asymmetric key– Public / private key– Openly distribute public key to all parties

Page 9: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 9

Types of Encryption Keys (cont.)

• One-time pad– Used once, is as large as the

message to be encrypted

Page 10: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 10

Substitution Cipher

• Plaintext characters are substituted to form ciphertext– “A” becomes “R”, “B” becomes “G”, etc.– Character rotation

• Caesar rotated three to the right (A > D, B > E, C > F, etc.)

– A table or formula is used

Page 11: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 11

Transposition Cipher

• Plaintext messages are transposed into ciphertext

Plaintext: ATTACK AT ONCE VIA NORTH BRIDGE– Write into columns going down– Read from columns to the right

A K C N B

T A E O R

T T V R I

A O I T D

C N A H G

Page 12: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 12

Transposition Cipher (cont.)

Ciphertext:

AKCNBTAEORTTVRIAOITDCNAHG• Subject to frequency analysis

attackA K C N B

T A E O R

T T V R I

A O I T D

C N A H G

Page 13: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 13

Monoalphabetic Cipher

• One alphabetic character is substituted or another– Caesar right-three

shift:

– Or a more random scheme:

• Subject to frequency analysis attack

A B C D E F G H I J … Z

D E F G H I J K L M … C

A B C D E F G H I J … Z

W E R T B N P Q C U … X

Page 14: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 14

Polyalphabetic Cipher

• Two or more substitution alphabets

Plaintext A B C D E F G H I … Z

Alpha 1 W E R T B N P Q C … X

Alpha 2 R B I K Q D X U N … E

Alpha 3 V B D R H W A X I … U

Alpha 4 M U T X D G P O W … F

Alpha 5 Y D V B J I K E Z … O

Page 15: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 15

Polyalphabetic Cipher (cont.)

• CAGED becomes RRADB

• Not subject to frequency attack

Plaintext A B C D E F G H I … Z

Alpha 1 W E R T B N P Q C … X

Alpha 2 R B I K Q D X U N … E

Alpha 3 V B D R H W A X I … U

Alpha 4 M U T X D G P O W … F

Alpha 5 Y D V B J I K E Z … O

Page 16: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 16

Running-key Cipher

• Plaintext letters converted to numeric (A=0, B=1, etc.)

• Plaintext values “added” to key values giving ciphertext

Page 17: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 17

Running-key Cipher

• Modulo arithmetic is used to keep results in range 0-26– Add 26 if results < 0; subtract 26 if results > 26

Plaintext A T T A C K A T O N C E V I A N

Key S E C R E T S E C R E T S E C R

Plaintext 0 19 19 0 2 10 0 19 14 13 2 4 21 8 0 13

Key 18 4 2 17 4 19 18 4 2 17 4 19 18 4 2 17

Sum 18 23 21 17 6 3 18 23 16 4 7 23 11 12 2 4

Ciphertext S X V R G D S X Q E H X L M C E

Page 18: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 18

One-time Pad

• Works like running key cipher, except that key is length of plaintext, and is used only once

• Highly resistant to cryptanalysis

Plaintext A T T A C K A T O N C E V I A N

Key X V G J E R I O Q W J P E K A F

Plaintext 0 19 19 0 2 10 0 19 14 13 2 4 21 8 0 13

Key 23 21 6 9 3 17 8 14 16 22 9 15 4 10 0 5

Sum 23 14 25 9 5 1 8 7 4 9 11 19 25 18 0 18

Ciphertext X O Z J F B I H E J L T Z U A U

Page 19: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 19

Block Ciphers

• Encrypt and decrypt a block of data at a time– Typically 128 bits

• Typical uses for block ciphers– Files, e-mail messages, text communications, web

Page 20: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 20

Block Ciphers (cont.)

• Well known encryption algorithms– §DES, 3DES, AES, CAST, Twofish, Blowfish,

§Serpent

Page 21: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 21

Block Cipher: Electronic Code Book

• Simplest block cipher mode

• Each block encrypted separately– Like plaintext encrypts to like ciphertext

Page 22: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 22

Block Cipher: Cipher-block Chaining (CBC)

• Ciphertext output from each encrypted plaintext block in the encryption used for the next block– First block encrypted with IV

(initialization vector)

Page 23: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 23

Block Cipher: Cipher Feedback (CFB)

• Plaintext for block N is XOR’d with the ciphertext from block N-1.

• In the first block, the plaintext XOR’d with the encrypted IV

Page 24: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 24

Block Cipher: Output Feedback (OFB)

• Plaintext is XOR’d with the encrypted material in the previous block to produce ciphertext

Page 25: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 25

Block Cipher: Counter (CTR)

• Uses a “nonce” (a random number that is used once) that is concatenated with a counter or other simple function, which is encrypted by…

Page 26: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 26

Block Cipher: Counter (cont.)

• …the block cipher, and the output XOR’d with the plaintext block to product the ciphertext block.

Page 27: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 27

Stream Ciphers

• Used to encrypt a continuous stream of data, such as an audio or video transmission– A stream cipher is a substitution cipher that typically

uses an exclusive-or (XOR) operation that can be performed very quickly by a computer.

Page 28: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 28

Stream Ciphers (cont.)

• Encryption: simple XOR with key:

• Decryption: simple XOR with the same key:

Plaintext 1 1 0 1 0 0 1 1 0 1 0 0 1 1 0 0

Key 0 1 1 0 1 0 0 1 0 1 1 0 1 0 1 0

Ciphertext 1 0 1 1 1 0 1 0 0 0 1 0 0 1 1 0

Ciphertext 1 0 1 1 1 0 1 0 0 0 1 0 0 1 1 0

Key 0 1 1 0 1 0 0 1 0 1 1 0 1 0 1 0

Plaintext 1 1 0 1 0 0 1 1 0 1 0 0 1 1 0 0

Page 29: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 29

Types of Encryption Keys

• Symmetric keys– Same key used at both ends of a

communications channel or session– A symmetric key is also known as

a shared secret

Page 30: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 30

Types of Encryption Keys (cont.)

• Issues related to communicating the key to the other party – it must be safely transmitted “out of band”

• Encryption algorithms that use symmetric keys– DES, 3DES, AES, Twofish, Blowfish, IDEA, RC5

Page 31: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 31

Types of Encryption Keys (cont.)

• Asymmetric keys (public key cryptography)– Overcomes the problem of communicating a

shared secret to another party– Key distribution scales better than symmetric

cryptography• All parties can share each others’ public keys

Page 32: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 32

Types of Encryption Keys (cont.)

• Asymmetric keys (cont.) – Use cases

• Encrypt message, sign message, sign and encrypt message

– Algorithms that use asymmetric keys• RSA, El Gamal, Elliptic Curve

Page 33: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 33

Diffie-Hellman Key Exchange

• Another way to overcome the problem of exchanging encryption keys without compromising them

1. Jane and Tom agree to a large prime number p and a base integer g. The values p and g may be transmitted over the network in the clear.

Page 34: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 34

Diffie-Hellman Key Exchange (cont.)

• Overcome the problem (cont.)2. Jane picks a secret integer a,

then calculates ga mod p and sends the result to Tom.

3. Tom picks a secret integer b, then calculates gb mod p and sends the result to Jane.

Page 35: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 35

Diffie-Hellman Key Exchange (cont.)

• Overcome the problem (cont.)4. Jane computes k=(gb mod p)a mod p.

5. Tom computes k=(ga mod p)b mod p.

• P is at least 300 digits; a and b at least 100 digits

Page 36: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 36

Protection of Encryption Keys

• Symmetric keys– Must be restricted to as few

people as possible– Protected by a strong password, or

encrypted again if needed

Page 37: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 37

Protection of Encryption Keys (cont.)

• Asymmetric keys– Private key requires protection similar to

symmetric key– Public keys can be published, even

on the Internet

Page 38: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 38

Protecting Keys in Applications

• More difficult to protect keys that applications must be able to access directly

Page 39: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 39

Protecting Keys in Applications (cont.)

• Hardening techniques– Separation of duties

• Key value known only to ops, not dev or support

Page 40: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 40

Protecting Keys in Applications (cont.)

• Hardening techniques (cont.)– Split custody

• Split key value or password among two or more persons

– Use of a key encrypting key

Page 41: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 41

Cryptanalysis

• Frequency analysis

• Birthday attacks

• Ciphertext only attack

• Chosen plaintext attack

Page 42: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 42

Cryptanalysis (cont.)

• Chosen ciphertext attack

• Known plaintext attack

• Man in the middle attack

• Replay attack

Page 43: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 43

Uses for Cryptography

• File encryption– PGP and GPG– WinZip (version 9 uses AES)– EFS (encrypting file system) for Windows– Crypt tool for Unix

Page 44: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 44

Uses for Cryptography (cont.)

• Encrypted volumes and disks– Truecrypt for Windows, Mac, Unix– Bitlocker for Windows Vista– PGP Disk– SafeBoot

Page 45: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 45

Uses for Cryptography (cont.)

• E-mail– PGP / GPG – asymmetric key (public key crypto)– S/MIME (Secure / Multipurpose Internet Mail

Extensions) – certificate based

Page 46: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 46

Uses for Cryptography (cont.)

• E-mail (cont.)– PEM (Privacy Enhanced Mail) – not widely

used, requires a single global PKI (which was never implemented)

– MOSS (MIME Object Security Services) – not widely used

Page 47: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 47

Uses for Cryptography (cont.)

• Web browsing – protects session contents from eavesdropping– SSL / TLS (Secure Sockets Layer /

Transport Layer Security)• 40-512 bit encryption with secure key

exchange

Page 48: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 48

Uses for Cryptography (cont.)

• Web browsing (cont.)• Server authentication common, client

authentication rare

– SET (Secure Electronic Transaction)• Not widely used

Page 49: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 49

Uses for Cryptography (cont.)

• Protecting network communications– SSH

• Replacement for telnet, rsh, rlogin

• Secure FTP

– SSL• Protects web browser traffic

Page 50: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 50

Uses for Cryptography (cont.)

• Network communications (cont.)– IPsec

• Encrypts all packets between established pairs of hosts

Page 51: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 51

Key Management

• Key creation– Process and results must be protected

• Key protection and custody – secured keys in control by the fewest number of persons

Page 52: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 52

Key Management (cont.)

• Key rotation – periodic update of encryption keys

• Key destruction – securely destroy, to protect encrypted data to be retired

• Key escrow – keys held by a trusted third party

Page 53: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 53

Message Digests and Hashing

• Message digest – the result of a cryptographic operation on a file or message– Fixed-length result regardless of message

size– Impossible to derive original message from

digest

Page 54: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 54

Message Digests and Hashing (cont.)

• Message digest (cont.)– No other message should produce the

same digest– Algorithms

• MD-5, SHA-1, HMAC

Page 55: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 55

Digital Signatures

• Message digest that is cryptographically combined with signer’s private key– Requires public key cryptography– Verifies message integrity– Verifies identity of signer– Algorithms: DSA, El Gamal, Elliptic Curve DSA

Page 56: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 56

Non-repudiation

• Inability for a user to repudiate (deny) an action, because of the methods used to permit or authorize the action

Page 57: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 57

Non-repudiation (cont.)

• Non-repudiation (cont.)– Digital signature

• Verifies integrity of transaction

• Verifies identity of person performing transaction

– Password required to use digital signature

Page 58: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 58

Public Key Infrastructure (PKI)

• Online facility– Storage of users’ public encryption keys– Fast lookup via an API that

makes use automatic– PKI platforms

• LDAP

• Microsoft Active Directory

Page 59: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 59

Encryption Alternatives

• Steganography– Data hidden in image files, subtle

changes that the eye won’t see; can be encrypted as well

– Many “stego” tools available

Page 60: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 60

Encryption Alternatives (cont.)

• Watermarking– Like a digital signature – a visible

or invisible mark that claims ownership

Page 61: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 61

Summary

• The methods of encryption are substitution, transposition, monoalphabetic, polyalphabetic, running-key, and one time pads

• Block ciphers are used to encrypt messages and files

Page 62: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 62

Summary (cont.)

• Stream ciphers are used to encrypt continuous streams of data such as video or audio

• Two types of keys are symmetric and asymmetric (or public key)

Page 63: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 63

Summary (cont.)

• Cryptanalysis is an attack on a cryptosystem

• Key management encompasses several procedures and safeguards used to create, manage, protect, use, and (eventually) destroy encryption keys

Page 64: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 64

Summary (cont.)

• Hashing is uses a cryptographic algorithm to create a message digest of a file or message, to verify integrity

• Non-repudiation is the concept of ensuring that a person cannot later deny having performed some action

Page 65: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 65

Summary (cont.)

• A public-key infrastructure (PKI) is a network-based service used to store digital certificates or public encryption keys of individuals in a community

Page 66: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 66

Summary (cont.)

• Steganography is used to hide information within some other media, such as an image, audio file, video stream, or slack space in a file

Page 67: Cryptography CISSP Guide to Security Essentials Chapter 5

CISSP Guide to Security Essentials 67

Summary (cont.)

• Watermarking is a visible form of steganography that is used to “label” a document, image, or data