null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
12045159
Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
Descrição
HBO CISSP (ISC)2 Mapa Mental sobre Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms, criado por Niels de Jonge em 30-01-2018.
Sem etiquetas
cissp
chapter 6
cryptography and symmetric key algorithms
domain 3
cissp (isc)2
hbo
Mapa Mental por
Niels de Jonge
, atualizado more than 1 year ago
Mais
Menos
Criado por
Niels de Jonge
quase 7 anos atrás
55
0
0
Resumo de Recurso
Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
Historical
Ceaser Cipher
ROT3
'Rotate 3' = A becomes D, Z Becomes C etc.
Simple crack by Frequency Analysis
American Civil War
Flag signs
Cipherdisks
Codebooks
WW II
Enigma
Ultra
Purple Machine
Crypto Bascis
Goals of Cryptography
Confidentiality
Symmetric
Shared Secret
Public key
A-Symmetric
consists of a combination of Private & Public Keys
Integrity
Safeguard through Digital Signatures
Protection from unauthorized modification; technique used in MitM
Authentication
Enforce challenge Response on shared secret
Nonrepudiation
Provide evidence of sending
Protection from masquerading; technique used in MitM
Data in Motion
Data at Rest
Cryptographic Concepts
Plaintext + Encryption = Ciphertext
Cryptographic Algorithm
knows a Key
is a Key Space
consist of a Bit Size
consist of a Binary code string ( 0 & 1)
is a Range between 0000... and 1111... or 0 to 2^n, where n is the bit size, is a range inside the algorithm a.k.a. the key
Cryptology
Cryptanalysis
Cryptography
Cryptographic Mathematics
Boolean
True or False ( 1 or 0 ) On or Off
Logical
AND
X^Y
X=1 Y=1 X^Y=1
Anotações:
X 110011010 Y 010100011 X^Y . 010000010
Two values both true
OR
X∨Y
X=0 Y=1 X∨Y=1
Anotações:
Y 100111100 X . 100110001 X∨Y . 100111101
One of the values is true
NOT
~ or !
X=0 ~X=1
Anotações:
X . 11001101010 ~X . 00110010101
Opposites
Exclusive OR / XOR
⊕
X=1 Y=1 X⊕Y=0
Anotações:
X . 101001110001 Y . 110011100101 X⊕Y . 011010010100
Only one of the values is true
Modulo Function (mod)
mod
Remainder value left after a possible and ideal division operation
Anotações:
4 mod 1 = 0 5 mod 2 = 1 65 mod 92 = 65 6 mod 6 = 0 82 mod 10 = 2 14 mod 5 = 4 64 mod 7 = 1
One-Way Functions
Math operation producing values for each possible input combination without possibility of retrieval of input value
basis for Public key cryptosystems
Work Function =/= Work Factor
Time needed to break encryption
Nonce
Added randomness to the encryption process
Zero Proof Knowledge
Magicdoor principle
Split knowledge
Key escrow
Segragation of duty by having multiple agents nessecary in order to decrypt
Ciphers
Hide true meaning / works on charaters and bits
Transposition cipher
Rearrange the sequence of the characters
Substitution cipher
Replacement of character by another
Codes
Codes represent words or phrases / are sometimes public knowledge
Modern Cryptography
Symmetric Cryptography
Cryptographic Lifecycle
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Final Exam 2015+
Alexandre Pinheiro
CISSP Domains
pikeje
Project Mngt Chapter 6
damimgd2u
Chapter 6 Homework
void pickle
Capitulum VI: Pensum C
Anita Thomer
Capitulum VI: Pensum B
Anita Thomer
50. People Are More Motivated As They Get Closer to a Goal
Miranda Davis
MARKETING CH 6: Customer Value-Driven Marketing Strategy: Creating
itachi uchiha
Part 2 - Ch 6: Functionalism: The Normal and the Pathological
missylew69
51. Variable Rewards are powerful
Miranda Davis
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Explore a Biblioteca