CISSP Domain 3 Security Engineering – Part 2 – Cryptographic Concepts Cheat Sheet


Public Key Infrastructure

PKI leverages all three forms of encryption to provide and manage digital certificates. Certificates may be server based or client based and used together to provide mutual authentication and encryption. The standard format is X.509.

NIST Special Publication 800-15 decribes the five components of PKI

  • Certification Authorities (CA) that issue and revoke certificates
  • Organization Registration Authorities (ORAs) that vouch for the binding between public keys and certificate holder identities and other attributes
  • Certificate holders that are issued certificates and can sign digital documents
  • Clients that validate digital signatures and their certification paths from a known public key of trusted CA
  • Repositories that store and make available certificates and certificate revocation lists (CRLs)

Certificate Authorities and Organizational Registration Authorities

CAs issue digital certificates and ORAs authenticates the identity of the certificate holder before issuing one to them. An organization can be both a CA and ORA. CAs can be private or public.

Certificate Revocation Lists

CAs maintain CRLs which contains a list of revoked certificates. It is a flat file which doesn’t scale well. The Online Certificate Status Protocol (OCSP) is a replacement for CRLs.

Key Management Issues

The confidentiality and integrity of the holder’s private key must be assured during the distribution process. The public/private key pairs userd in PKI should be stored securely. Key storage means the organization that issued the keys retains a copy. Key Escrow means a third party organization (often law enforcements) retains a copy.

SSL and TLS

SSL authenticates and provides confidentiality to web traffic. TLS is the successor of SSL. When you visit an HTTPS website, traffic is encrypted using assymetric keys (the public key of the website), which is signed by the CA’s private key (such as Versign). If your browser trusts the CA, then the signature authenticates the site. Then the browser uses the encrypted session to exchange a symmetric key to encrypt the rest of the session. The private key is stored on the webserver which allows it to decrypt anything encrypted with the public key.

Ciphers used could include RSA/DSA for authentication and AES or DES for confidentiality. SSL2.0 was first released then 3.0 improved on security issues and now TLS improves on 3.0.

IPSEC

IPSEC (Internet protocol security) is a suite of protocols to provide cryptographic layer to both IPv4 and IPv6, mainly used in VPN networks. IPSec includes two primary protocols AH and ESP with differing and overlapping functionality. Supporting IPSEC protocols include ISAKMP (Internet Security Association Key Management Protocol) and IKE (Internet Key Exchange).

AH and ESP

  • AH – Authentication Header – Provides authentication and integrity but no confidentiality – protects against replay attacks
  • ESP – Encapsulating Security Payload – Provides authentication, integrity and confidentiality

Security Association and ISAKMP

  • SA – One way connection that may be used to negotiate ESP or AH parameters, if two systems use ESP they use two SAs (one for each direction), if they use AH as well that’s a total of 4. A unique 32bit number called Security Parameter Index identifies each SA
  • ISAKMP – manages the SA creation process

Tunnel and Transport Mode

  • Tunnel Mode – Used to provide point-to-point IPSEC tunnels, ESP tunnel mode encrypts entire packet including headers, does not need AH
  • Transport Mode – Only encrypts the data and not headers, uses both AH and ESP, weaker and arguably AH and Transport mode should be droppped.

IKE

IPSec can use variety of encryption algorithms such as MD5/SHA1 for integrity and AES, 3DES for confidentiality. IKE is responsible for negotiating the algorithm selection process.

PGP

Pretty Good Privacy (PGP) was created by Phil Zimmerman which brought asymetric encryption to the masses. He was investigated for munitions export violations by the US and infringed RSA patents. The case was dropped and Zimmerman agreed to stop publishing PGP (though source code already made freely available).

PGP is used for confidentiality, integrity, authentication and non-repudation. It can be used to encrypt emails, documents, or entire disk drives. PGP uses a web of trust model (if you trust me, you trust everyone I trust).

S/MIME

MIME (Multipuprose Internet Mail Extension) provides a standard way to format email including characters, sets and attachments. S/MIME (Secure/MIME) leverages PKI to encrypt and authenticate MIME-encoded email. The client or client’s email server (S/MIME gateway) may perform the encryption.

Escrowed Encryption

Escrowed encryption means a third party organization holds a copy of the public/private key pair. Divided into two or more parts each with the a different trusted third party which will only release upon authorization. Goal is to ensure balance between privacy and needs of law enforcement or ensure encrypted data is recoverable in the event of key loss or employee termination.

Clipper Chip

Name of the technology used in Escrowed Encryption Standard (EES), an effort by the US to deploy escrowed encryption in telecommunication. It was classified secret but often such ciphers are found to be insecure and was abandoned due to media firestorm.

Steganograhy

Steganography is the science of hidden communication. The communication itself is not hidden, only the meaning is concealed. Modern steganography hides information inside data files such as images and music. Images can be encoded with extra bits of information hidden from the naked eye using a methods called bit substition and injection that changes the integrity of the file. Messages can be first encrypted first before hidden via steganography.

Watemarks

Digital watermarks encode data into a file. The watermark may be hidden using steganography. Watermarks are often used to fingerprint fiels (tying a copy of a file to it’s owner).

Related Posts with Thumbnails

About the Author

Alfred Tong
Author and owner of this blog. A Networking enthusiast, full time networking and systems Engineer. Generally curious about all things IT.Certifications: GIAC GSEC, CCNP-S, CCNP, CCSP, CCDP, CCNA, RHCE, JNCIA - FWV