Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security+ guide to network security fundamentals fourth edition answers

18/03/2021 Client: saad24vbs Deadline: 2 Day

Security+ Guide to Network Security Fundamentals, Fourth Edition

Chapter 11

Basic Cryptography

1

Defining Cryptography

What is cryptography?

Scrambling information so it appears unreadable to attackers

Transforms information into secure form

Stenography

Hides the existence of data

Image, audio, or video files containing hidden message embedded in the file

Achieved by dividing data and hiding in unused portions of the file

Security+ Guide to Network Security Fundamentals, Fourth Edition

2

2

Security+ Guide to Network Security Fundamentals, Fourth Edition

3

Figure 11-1 Data hidden by stenography

© Cengage Learning 2012

3

Security+ Guide to Network Security Fundamentals, Fourth Edition

4

Cryptography Process

4

Cryptographic Algorithms

Three categories of cryptographic algorithms

Hash algorithms

Symmetric encryption algorithms

Asymmetric encryption algorithms

Hash algorithms

Most basic type of cryptographic algorithm

Process for creating a unique digital fingerprint for a set of data

Contents cannot be used to reveal original data set

Primarily used for comparison purposes

Security+ Guide to Network Security Fundamentals, Fourth Edition

5

5

Cryptographic Algorithms (cont’d.)

Example of hashing (ATMs)

Bank customer has PIN of 93542

Number is hashed and result stored on card’s magnetic stripe

User inserts card in ATM and enters PIN

ATM hashes the pin using the same algorithm that was used to store PIN on the card

If two values match, user may access ATM

Security+ Guide to Network Security Fundamentals, Fourth Edition

6

6

Security+ Guide to Network Security Fundamentals, Fourth Edition

7

Defeating “Man in the Middle”

7

Cryptographic Algorithms (cont’d.)

Most common hash algorithms

Message Digest

Secure Hash Algorithm

Whirlpool

RIPEMD

Password hashes

Security+ Guide to Network Security Fundamentals, Fourth Edition

8

8

Cryptographic Algorithms (cont’d.)

Message Digest (MD)

Three versions

Message Digest 2

Takes plaintext of any length and creates 128 bit hash

Padding added to make short messages 128 bits

Considered too slow today and rarely used

Message Digest 4

Has flaws and was not widely accepted

Security+ Guide to Network Security Fundamentals, Fourth Edition

9

9

Cryptographic Algorithms (cont’d.)

Message Digest 5

Designed to address MD4’s weaknesses

Message length padded to 512 bits

Weaknesses in compression function could lead to collisions

Some security experts recommend using a more secure hash algorithm

Secure Hash Algorithm (SHA)

More secure than MD

No weaknesses identified

Example of HIT certification requirement

Security+ Guide to Network Security Fundamentals, Fourth Edition

10

10

Cryptographic Algorithms (cont’d.)

Whirlpool

Recent cryptographic hash

Adopted by standards organizations

Creates hash of 512 bits

Race Integrity Primitives Evaluation Message Digest (RIPEMD)

Two different and parallel chains of computation

Results are combined at end of process

Security+ Guide to Network Security Fundamentals, Fourth Edition

11

11

Cryptographic Algorithms (cont’d.)

Password hashes

Used by Microsoft Windows operating systems

LAN Manager hash

New Technology LAN Manager (NTLM) hash

Linux and Apple Mac strengthen password hashes by including random bit sequences

Known as a salt

Make password attacks more difficult

Security+ Guide to Network Security Fundamentals, Fourth Edition

12

12

Symmetric Cryptographic Algorithms

Original cryptographic algorithms

Stream, Monalphabetic Substitute, Transposition, Combine (cipher with plain text) – all fairly simple to crack

OTP (One Time Pad) fairly secure if not reused

Block Cipher (8-16) bytes encrypted independently

All cycle intensive

Security+ Guide to Network Security Fundamentals, Fourth Edition

13

13

Symmetric Cryptographic Algorithms

Data Encryption Standard

Triple Data Encryption Standard

Advanced Encryption Standard

Several other algorithms

Understanding symmetric algorithms

Same shared single key used to encrypt and decrypt document

Security+ Guide to Network Security Fundamentals, Fourth Edition

14

14

Symmetric Cryptographic Algorithms

Data Encryption Standard (DES)

Based on product originally designed in early 1970s

Adopted as a standard by the U.S. government

Triple Data Encryption standard (3DES)

Designed to replace DES

Uses three rounds of encryption

Ciphertext of first round becomes input for second iteration

Most secure versions use different keys used for each round

Security+ Guide to Network Security Fundamentals, Fourth Edition

15

15

Security+ Guide to Network Security Fundamentals, Fourth Edition

16

Figure 11-11 3DES

© Cengage Learning 2012

16

Symmetric Cryptographic Algorithms (cont’d.)

Advanced Encryption Standard (AES)

Symmetric cipher approved by NIST in 2000 as replacement for DES

Official encryption standard used by the U.S. government

Performs three steps on every block of plaintext

Designed to be secure well into the future

Adopted as a certification requirement for HIT in 2008

Security+ Guide to Network Security Fundamentals, Fourth E

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professional Coursework Help
ECFX Market
Financial Analyst
Chartered Accountant
Calculation Guru
Assignment Hub
Writer Writer Name Offer Chat
Professional Coursework Help

ONLINE

Professional Coursework Help

I have read your project details. I can do this within your deadline.

$105 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I have read your project details. I can do this within your deadline.

$16 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

Give me a chance, i will do this with my best efforts

$59 Chat With Writer
Chartered Accountant

ONLINE

Chartered Accountant

I will cover all the points which you have mentioned in your project details.

$109 Chat With Writer
Calculation Guru

ONLINE

Calculation Guru

Give me a chance, i will do this with my best efforts

$104 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$87 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Silvers gym - What are the credit risks faced by retail banking - 21a rachelle road keilor east - The crucible act 3 packet answers - Affordable Second Hand Restaurant Equipment for Sale - Soothe by apana pressure point headrest review - Macquarie university free parking - Salesforce inbound api limits - Condensation polymer examples teflon - Bac evaporative condenser catalogue - Setting of ready player one - 6 valesini court caboolture - How many ounces in a gallon of paint - Why is there a pop sound when hydrogen is burnt - I NEED A PERSONAL WRITER TO HANDLE MY ASSIGNMENTS - Inspector goole final speech - 3 to 5 minuet presentation - Journal of organizational behavior pdf - Stage directions the crucible - Contra actions to spray tanning - Naplan stimulus persuasive writing - Havant 6th form college - Anz eftpos terminal support - Cr nh3 6 no3 3 element or compound - Project 2-6: don funk music video problems (pg.58 of your workbook) - 1-3 Case Study: Single-Event Analysis—The Wrong Patient - Family of directions miller indices - Correspondence teacher training course - 1kd turbo actuator wiring diagram - Dana hall funding a mission - Assigment 22222 fund - Harvard referencing website rmit - A piece of aluminum foil cm square - Which decelerates faster a badminton shuttlecock or a baseball - Project scope management case study - Snowy river national park accommodation - Rereading america 10th edition reddit - Framing Innovation in Entrepreneurial Ventures - The cladogram of animals 25.2 answers - Application process flowchart - Module 3 forecasting and contracts - 1250-1500 word answer - External electrical cardioversion cpt code - Doritos illuminati - Hr strategy responding to a union organizing drive - Age structure diagram worksheet - Www jewfaq org kashrut htm - Different types of maps - Complete an investigation of the economic indicators of the countries you have chosen. This will allow you to analyze whether one is a viable location for your company. - How to write a conclusion for a lab - Kepner tregoe matrix - Breaking night liz murray sparknotes - Marching band leadership positions - 3 person in english - Racq tow truck cost - Health Unit2-1 - Select a company listed in nasdaq - Essential skills training & recruitment - Advanced pathophysiology neurological section - Fawkham manor hospital history - Journal - Claus palais royal paris - Korean melodramas - Assignment #014 - Business statistics cheat sheet - Moon pearls chinese herbs - Probability Sampling and Nonprobability Sampling - Jbl eon musicmix 10 - Mis padres siempre ________ las llaves - Discount matrix transactional analysis - PICO Question - In the ____________, households work and receive payment from firms. - Coca cola mission vision statement - Midterm Exam, Due in 24 h - Is macconkey agar chemically defined - The comforts of home flannery o connor sparknotes - Tafe wa electrical pre apprenticeship - Imagery in a rose for emily - Rationale for government intervention in international trade - Discussion board - Module 07 Case Study - Annual Report Project - Section 3 - Political science - Sae oil viscosity temperature chart - Synthes product catalog pdf - Describe and explain what is going on in the case by using theoretical concepts and relations among concepts from the OB and the ob traditions. - Guy's thatched hamlet history - Refractive index apparent depth method - How to reduce employee turnover rate in capsim - Dr shelly betman patient portal - Accounting III- Week 4 Discussion - Types of progress notes - 2.19 5 circle pyramid 2.0 - Tanx 1 cotx cotx 1 tanx - Co active coaching certification program - Stat 201 help - Many studies show social media networks have a very strong impact on external workplace communication. What about their impacts on internal workplace communication? Discuss and give your opinion in management perspective. - I need 600 words in 5 different sources in my 4 topics - Game development proposal template - What does arpanet stand for