Zusammenfassung der Ressource
Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
- Historical
- Ceaser Cipher
- ROT3
- 'Rotate 3' = A becomes D, Z Becomes C etc.
- Simple crack by Frequency Analysis
- American Civil War
- Flag signs
- Cipherdisks
- Codebooks
- WW II
- Enigma
- Ultra
- Purple
Machine
- Crypto Bascis
- Goals of Cryptography
- Confidentiality
- Symmetric
- Shared
Secret
- Public key
- A-Symmetric
- consists of a combination of
Private & Public Keys
- Integrity
- Safeguard
through Digital
Signatures
- Protection from
unauthorized
modification; technique
used in MitM
- Authentication
- Enforce challenge
Response on shared
secret
- Nonrepudiation
- Provide
evidence of
sending
- Protection from
masquerading;
technique used in MitM
- Data in Motion
- Data at Rest
- Cryptographic
Concepts
- Plaintext + Encryption =
Ciphertext
- Cryptographic Algorithm
- knows a
Key
- is a Key
Space
- consist of a
Bit Size
- consist of a Binary
code string ( 0 & 1)
- is a Range between 0000... and 1111... or
0 to 2^n, where n is the bit size, is a
range inside the algorithm a.k.a. the key
- Cryptology
- Cryptanalysis
- Cryptography
- Cryptographic Mathematics
- Boolean
- True or False ( 1
or 0 ) On or Off
- Logical
- AND
- X^Y
- X=1 Y=1 X^Y=1
Anmerkungen:
- X 110011010
Y 010100011
X^Y . 010000010
- Two values
both true
- OR
- X∨Y
- X=0 Y=1
X∨Y=1
Anmerkungen:
- Y 100111100
X . 100110001
X∨Y . 100111101
- One of the
values is
true
- NOT
- ~ or !
- X=0
~X=1
Anmerkungen:
- X . 11001101010
~X . 00110010101
- Opposites
- Exclusive OR /
XOR
- ⊕
- X=1 Y=1
X⊕Y=0
Anmerkungen:
- X . 101001110001
Y . 110011100101
X⊕Y . 011010010100
- Only one of the
values is true
- Modulo Function
(mod)
- mod
- Remainder value left
after a possible and ideal
division operation
Anmerkungen:
- 4 mod 1 = 0
5 mod 2 = 1
65 mod 92 = 65
6 mod 6 = 0
82 mod 10 = 2
14 mod 5 = 4
64 mod 7 = 1
- One-Way
Functions
- Math operation producing values
for each possible input
combination without possibility of
retrieval of input value
- basis for Public key
cryptosystems
- Work Function =/= Work Factor
- Time needed to break
encryption
- Nonce
- Added randomness to
the encryption process
- Zero Proof Knowledge
- Magicdoor principle
- Split knowledge
- Key escrow
- Segragation of duty by having
multiple agents nessecary in
order to decrypt
- Ciphers
- Hide true meaning /
works on charaters
and bits
- Transposition cipher
- Rearrange the
sequence of the
characters
- Substitution cipher
- Replacement of
character by
another
- Codes
- Codes represent words or
phrases / are sometimes
public knowledge
- Modern Cryptography
- Symmetric
Cryptography
- Cryptographic
Lifecycle