null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12045159
Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
Description
HBO CISSP (ISC)2 Mind Map on Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms, created by Niels de Jonge on 30/01/2018.
No tags specified
cissp
chapter 6
cryptography and symmetric key algorithms
domain 3
cissp (isc)2
hbo
Mind Map by
Niels de Jonge
, updated more than 1 year ago
More
Less
Created by
Niels de Jonge
almost 7 years ago
55
0
0
Resource summary
Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
Historical
Ceaser Cipher
ROT3
'Rotate 3' = A becomes D, Z Becomes C etc.
Simple crack by Frequency Analysis
American Civil War
Flag signs
Cipherdisks
Codebooks
WW II
Enigma
Ultra
Purple Machine
Crypto Bascis
Goals of Cryptography
Confidentiality
Symmetric
Shared Secret
Public key
A-Symmetric
consists of a combination of Private & Public Keys
Integrity
Safeguard through Digital Signatures
Protection from unauthorized modification; technique used in MitM
Authentication
Enforce challenge Response on shared secret
Nonrepudiation
Provide evidence of sending
Protection from masquerading; technique used in MitM
Data in Motion
Data at Rest
Cryptographic Concepts
Plaintext + Encryption = Ciphertext
Cryptographic Algorithm
knows a Key
is a Key Space
consist of a Bit Size
consist of a Binary code string ( 0 & 1)
is a Range between 0000... and 1111... or 0 to 2^n, where n is the bit size, is a range inside the algorithm a.k.a. the key
Cryptology
Cryptanalysis
Cryptography
Cryptographic Mathematics
Boolean
True or False ( 1 or 0 ) On or Off
Logical
AND
X^Y
X=1 Y=1 X^Y=1
Annotations:
X 110011010 Y 010100011 X^Y . 010000010
Two values both true
OR
X∨Y
X=0 Y=1 X∨Y=1
Annotations:
Y 100111100 X . 100110001 X∨Y . 100111101
One of the values is true
NOT
~ or !
X=0 ~X=1
Annotations:
X . 11001101010 ~X . 00110010101
Opposites
Exclusive OR / XOR
⊕
X=1 Y=1 X⊕Y=0
Annotations:
X . 101001110001 Y . 110011100101 X⊕Y . 011010010100
Only one of the values is true
Modulo Function (mod)
mod
Remainder value left after a possible and ideal division operation
Annotations:
4 mod 1 = 0 5 mod 2 = 1 65 mod 92 = 65 6 mod 6 = 0 82 mod 10 = 2 14 mod 5 = 4 64 mod 7 = 1
One-Way Functions
Math operation producing values for each possible input combination without possibility of retrieval of input value
basis for Public key cryptosystems
Work Function =/= Work Factor
Time needed to break encryption
Nonce
Added randomness to the encryption process
Zero Proof Knowledge
Magicdoor principle
Split knowledge
Key escrow
Segragation of duty by having multiple agents nessecary in order to decrypt
Ciphers
Hide true meaning / works on charaters and bits
Transposition cipher
Rearrange the sequence of the characters
Substitution cipher
Replacement of character by another
Codes
Codes represent words or phrases / are sometimes public knowledge
Modern Cryptography
Symmetric Cryptography
Cryptographic Lifecycle
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Final Exam 2015+
Alexandre Pinheiro
CISSP Domains
pikeje
Project Mngt Chapter 6
damimgd2u
Chapter 6 Homework
void pickle
Capitulum VI: Pensum C
Anita Thomer
Capitulum VI: Pensum B
Anita Thomer
50. People Are More Motivated As They Get Closer to a Goal
Miranda Davis
MARKETING CH 6: Customer Value-Driven Marketing Strategy: Creating
itachi uchiha
Part 2 - Ch 6: Functionalism: The Normal and the Pathological
missylew69
51. Variable Rewards are powerful
Miranda Davis
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Browse Library