Cryptography: Hashing
one-way (irreversible) function that produces a unique ‘hash digest’. ensures data integrity
Cryptography: 2 sides of cryptography
What does it ensure?
2 way street (encryption & decryption); ensures CONFIDENTIALITY
Cryptography: Salting
adding additional random characters to a pw so that no 2 passwords will produce the same hash digest, even if the initial passwords are the same
Cryptography: Collision
When different inputs produce the same hashed output, indicating weakness.
Cryptography: Hashing Algorithms (3)
Common hashing functions. Produce a hash digest. MD5 (old), SHA-256, and SHA-512
Cryptography: Symmetric encryption
same key used to both encrypt & decrypt, therefore easily broken
Cryptography: Asymmetric Encryption
uses different keys for encryption and decryption
Cryptography: PKI
public key infrastructure
ensures a public key corresponds to only ONE person/entity, to avoid private key/info sharing
Cryptography: Certificate definition
- 2 types
a unique key-pair assignment from a certificate authority. types: third-party and self-signed (for use within org)
Cryptography: Certificate Authority
a trusted org that assigns certs to applicants, maintains records
Cryptography: Intermediate CA
different levels of CAs (certificate authority) help segment certificate management. if one goes down, fewer people have to recertify. lower ones must be certified by a higher-authority CA. trace chain of trust back to a root ca.
Cryptography: OCSP
online certification status protocol: lets a host query the status of a cert
Cryptography: certificate duration — & is longer or shorter most secure?
-usually 3 mo-1 year
- shorter cert durations are more secure bc if one is compromised, it won’t stay valid for long—limiting exposure
Cryptography Applications: Code Signing
done via hashing the file & signing the hash with the developer’s private key to provide a certificate-based digital signature. signature = encrypted hash + timestamp ensures INTEGRITY
Cryptography Applications: Digital Signatures definition
a digital signature is a cryptographic way to prove:
1 INTEGRITY
2 AUTHENTICITY
3 NON-REPUDIATION
comprised of a hash digest of the message, which is then encrypted with the sender’s private key
NOTE: digital signatures are NOT encryption of the message itself; they do NOT offer confidentiality. just authenticity (not in CIA) and integrity.
Cryptography Applications: Blockchain
Cryptographic Tools: Key management (Curtain Soon Drops—Raise, Revoke, Destroy)
full lifecycle handling of cryptographic keys:
creation, storage, distribution, rotation/rollover, revocation, and destruction
during key ro
Cryptographic Tools: Secure Enclave
encrypted, physically + logically isolated portion of a device. use dfor storing keys, cryptographic calculations, DRM. only specific apps/processes can interact with it.
Cryptographic Tools: TPM
trusted platform module
- chip for identifying a specific sysem motherboard. either on it or add-on. protects small amounts of sensitive info
Cryptographic Tools: HSM
hardware security module
basically a GPU. handles intense encryption/decryption computations offloaded from main CPU
Levels of encryption (6): First Position Very Firm Demi Rond
Cryptography: ROT
rotated [meaning alphabet has been rotated from its original position, eg ROT13 = alphabet rotated 13 spaces]
Asymmetric Encryption: Diffe-Hellman Key Exchange
Each party calculates S using their private key and the other’s public key: S = (other public key)^(own private key) mod p. They end up with the same S, which is never transmitted.
Cryptography: Encryption: In-band and out-of-band exchanges
in-band: keys exchanged over same primary channel used for communication
out-of-band: keys sent over unrelated channel eg verbally or mail