Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security+ guide to network security fundamentals fourth edition answers

03/12/2021 Client: muhammad11 Deadline: 2 Day

Security+ Guide to Network Security Fundamentals, Fourth Edition

Chapter 11

Basic Cryptography

1

Defining Cryptography

What is cryptography?

Scrambling information so it appears unreadable to attackers

Transforms information into secure form

Stenography

Hides the existence of data

Image, audio, or video files containing hidden message embedded in the file

Achieved by dividing data and hiding in unused portions of the file

Security+ Guide to Network Security Fundamentals, Fourth Edition

2

2

Security+ Guide to Network Security Fundamentals, Fourth Edition

3

Figure 11-1 Data hidden by stenography

© Cengage Learning 2012

3

Security+ Guide to Network Security Fundamentals, Fourth Edition

4

Cryptography Process

4

Cryptographic Algorithms

Three categories of cryptographic algorithms

Hash algorithms

Symmetric encryption algorithms

Asymmetric encryption algorithms

Hash algorithms

Most basic type of cryptographic algorithm

Process for creating a unique digital fingerprint for a set of data

Contents cannot be used to reveal original data set

Primarily used for comparison purposes

Security+ Guide to Network Security Fundamentals, Fourth Edition

5

5

Cryptographic Algorithms (cont’d.)

Example of hashing (ATMs)

Bank customer has PIN of 93542

Number is hashed and result stored on card’s magnetic stripe

User inserts card in ATM and enters PIN

ATM hashes the pin using the same algorithm that was used to store PIN on the card

If two values match, user may access ATM

Security+ Guide to Network Security Fundamentals, Fourth Edition

6

6

Security+ Guide to Network Security Fundamentals, Fourth Edition

7

Defeating “Man in the Middle”

7

Cryptographic Algorithms (cont’d.)

Most common hash algorithms

Message Digest

Secure Hash Algorithm

Whirlpool

RIPEMD

Password hashes

Security+ Guide to Network Security Fundamentals, Fourth Edition

8

8

Cryptographic Algorithms (cont’d.)

Message Digest (MD)

Three versions

Message Digest 2

Takes plaintext of any length and creates 128 bit hash

Padding added to make short messages 128 bits

Considered too slow today and rarely used

Message Digest 4

Has flaws and was not widely accepted

Security+ Guide to Network Security Fundamentals, Fourth Edition

9

9

Cryptographic Algorithms (cont’d.)

Message Digest 5

Designed to address MD4’s weaknesses

Message length padded to 512 bits

Weaknesses in compression function could lead to collisions

Some security experts recommend using a more secure hash algorithm

Secure Hash Algorithm (SHA)

More secure than MD

No weaknesses identified

Example of HIT certification requirement

Security+ Guide to Network Security Fundamentals, Fourth Edition

10

10

Cryptographic Algorithms (cont’d.)

Whirlpool

Recent cryptographic hash

Adopted by standards organizations

Creates hash of 512 bits

Race Integrity Primitives Evaluation Message Digest (RIPEMD)

Two different and parallel chains of computation

Results are combined at end of process

Security+ Guide to Network Security Fundamentals, Fourth Edition

11

11

Cryptographic Algorithms (cont’d.)

Password hashes

Used by Microsoft Windows operating systems

LAN Manager hash

New Technology LAN Manager (NTLM) hash

Linux and Apple Mac strengthen password hashes by including random bit sequences

Known as a salt

Make password attacks more difficult

Security+ Guide to Network Security Fundamentals, Fourth Edition

12

12

Symmetric Cryptographic Algorithms

Original cryptographic algorithms

Stream, Monalphabetic Substitute, Transposition, Combine (cipher with plain text) – all fairly simple to crack

OTP (One Time Pad) fairly secure if not reused

Block Cipher (8-16) bytes encrypted independently

All cycle intensive

Security+ Guide to Network Security Fundamentals, Fourth Edition

13

13

Symmetric Cryptographic Algorithms

Data Encryption Standard

Triple Data Encryption Standard

Advanced Encryption Standard

Several other algorithms

Understanding symmetric algorithms

Same shared single key used to encrypt and decrypt document

Security+ Guide to Network Security Fundamentals, Fourth Edition

14

14

Symmetric Cryptographic Algorithms

Data Encryption Standard (DES)

Based on product originally designed in early 1970s

Adopted as a standard by the U.S. government

Triple Data Encryption standard (3DES)

Designed to replace DES

Uses three rounds of encryption

Ciphertext of first round becomes input for second iteration

Most secure versions use different keys used for each round

Security+ Guide to Network Security Fundamentals, Fourth Edition

15

15

Security+ Guide to Network Security Fundamentals, Fourth Edition

16

Figure 11-11 3DES

© Cengage Learning 2012

16

Symmetric Cryptographic Algorithms (cont’d.)

Advanced Encryption Standard (AES)

Symmetric cipher approved by NIST in 2000 as replacement for DES

Official encryption standard used by the U.S. government

Performs three steps on every block of plaintext

Designed to be secure well into the future

Adopted as a certification requirement for HIT in 2008

Security+ Guide to Network Security Fundamentals, Fourth Edition

17

17

Other Algorithms

Rivest Cipher (RC)

Family of cipher algorithms designed by Ron Rivest

International Data Encryption Algorithm (IDEA)

Used in European nations

Block cipher processing 64 bits with a 128-bit key with 8 rounds

Blowfish

Block cipher operating on 64-bit blocks with key lengths from 32-448 bits

No significant weaknesses have been identified

Security+ Guide to Network Security Fundamentals, Fourth Edition

18

18

Asymmetric Cryptographic Algorithms

Weakness of symmetric algorithms

Distributing and maintaining a secure single key among multiple users distributed geographically

Asymmetric cryptographic algorithms

Also known as public key cryptography

Uses two mathematically related keys

Public key available to everyone and freely distributed

Private key known only to individual to whom it belongs

Security+ Guide to Network Security Fundamentals, Fourth Edition

19

19

Asymmetric Cryptographic Algorithms (cont’d.)

Important principles

Key pairs

Public key

Private key

Both directions

Digital signature

Verifies the sender

Prevents sender from disowning the message

Proves message integrity

Security+ Guide to Network Security Fundamentals, Fourth Edition

20

20

Security+ Guide to Network Security Fundamentals, Fourth Edition

21

Figure 11-13 Digital signature

© Cengage Learning 2012

21

Asymmetric Cryptographic Algorithms (cont’d.)

RSA

Published in 1977 and patented by MIT in 1983

Most common asymmetric cryptography algorithm

Uses two large prime numbers

Elliptic curve cryptography (ECC)

Users share one elliptic curve and one point on the curve

Uses less computing power than prime number-based asymmetric cryptography

Key sizes are smaller

Security+ Guide to Network Security Fundamentals, Fourth Edition

22

22

Asymmetric Cryptographic Algorithms

Quantum cryptography

Exploits the properties of microscopic objects such as photons

Does not depend on difficult mathematical problems

Any interruption is noticed see video here

NTRUEncypt

New, only been in existence since 1996

Uses lattice-based cryptography

Relies on a set of points in space

Faster than RSA and ECC

More resistant to quantum computing attacks

Still being vetted

Security+ Guide to Network Security Fundamentals, Fourth Edition

23

23

Using Cryptography

Cryptography

Should be used to secure data that needs to be protected

Can be applied through either software or hardware

Security+ Guide to Network Security Fundamentals, Fourth Edition

24

24

Encryption Through Software

File and file system cryptography

Encryption software can be applied to one or many files

Protecting groups of files

Based on operating system’s file system

Pretty Good Privacy (PGP)

Widely used asymmetric cryptography system

Used for files and e-mails on Windows systems

GNU Privacy Guard (GPG)

Runs on Windows, UNIX, and Linux

Security+ Guide to Network Security Fundamentals, Fourth Edition

25

25

Encryption Through Software (cont’d.)

PGP and GPG use both asymmetric and symmetric cryptography

Microsoft Windows Encrypting File System (EFS)

Cryptography system for Windows

Uses NTFS file system

Tightly integrated with the file system

Encryption and decryption transparent to the user

Users can set encryption attribute for a file in the Advanced Attributes dialog box

Security+ Guide to Network Security Fundamentals, Fourth Edition

26

26

Encryption Through Software (cont’d.)

Whole disk encryption

Protects all data on a hard drive

Example: BitLocker drive encryption software

Not perfect but one more step

Video he erfre

https://www.youtube.com/watch?v=Tr5SgShepME

Security+ Guide to Network Security Fundamentals, Fourth Edition

27

27

Hardware Encryption

Software encryption can be subject to attacks to exploit its vulnerabilities

Cryptography can be embedded in hardware

Provides higher degree of security

Can be applied to USB devices and standard hard drives

Trusted platform module

Hardware security model

Security+ Guide to Network Security Fundamentals, Fourth Edition

28

28

Hardware Encryption (cont’d.)

USB device encryption

Encrypted hardware-based flash drives

Will not connect a computer until correct password has been provided

All data copied to the drive is automatically encrypted

Tamper-resistant external cases

Administrators can remotely control and track activity on the devices

Stolen drives can be remotely disabled

Security+ Guide to Network Security Fundamentals, Fourth Edition

29

29

Hardware Encryption (cont’d.)

Trusted Platform Module (TPM)

Chip on computer’s motherboard that provides cryptographic services

Includes a true random number generator

Entirely done in hardware so cannot be subject to software attack

Prevents computer from booting if files or data have been altered

Prompts for password if hard drive moved to a new computer

Security+ Guide to Network Security Fundamentals, Fourth Edition

30

30

Hardware Encryption (cont’d.)

Hardware Security Module (HSM)

Secure cryptographic processor

Includes onboard key generator and key storage facility

Performs accelerated symmetric and asymmetric encryption

Can provide services to multiple devices over a LAN

One more movie

https://zybersafe.com/video-hardware-based-encryption/

Security+ Guide to Network Security Fundamentals, Fourth Edition

31

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professional Accountant
Engineering Mentor
Professor Smith
Online Assignment Help
Top Grade Essay
Smart Homework Helper
Writer Writer Name Offer Chat
Professional Accountant

ONLINE

Professional Accountant

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$37 Chat With Writer
Engineering Mentor

ONLINE

Engineering Mentor

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$44 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$40 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$34 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$21 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Types of perceptual errors in organisational behaviour - How does embedding the public key in a digital certificate protect it from impersonators - Use work ethic in a sentence - How to calculate physical address from virtual address - Disney supplier code of conduct - COM 201: The Power of Effective Speaking. - Advantages of job analysis in human resource management - Naadac code of ethics apa citation - Subscriber line interface circuit - The old man and the sea section 1 answers - Reverse outlines are unique in that they are - Discussion - OP - Implementation plan - Few paragraphs - Car radio song meaning - Assignment: Applying Narrative and Solution-Focused Therapy - BUS 310 Week 3 Assignment Tough Conversations - Daedalus and icarus ovid - Pay policy mix - Sale of common stock to investors account classification - Salvador dali frida kahlo relationship - Hunter united internet banking - Steal all the sheep from the cyclops - Essentialfunctions xlsx at www seletraining com - Ruck march packing list - Power in social work - Daisy's carelessness in the great gatsby - Bbc dance mat touch typing - 6.4 Nonprofit Fundraising Case Study: Part II - Explorer's guide to wildemount pdf - Unit 1 Assignment 1 - Solver - Gibson 498t wiring diagram - Yukl 2013 leadership in organizations pdf - Zimbardo - Wireless Security & Forensics - I need 1500 words in develop plan and goals for myself - Schemas openxmlformats org package 2006 content types - Managerial Accounting - Good vs evil essay - Construct viable arguments and critique the reasoning of others - Body centered cubic unit cell packing efficiency - EBP Part 6 - HR Challenge: Hire From Within or Outside? - Mat 144 major assignment 1 - Case study - In the absence of carbohydrate, ________ are produced from the incomplete breakdown of body fat. - Human impacts on the rainforest-past and present - Personal services income examples - Module 10 discussion Ethical Dilemma - Tupac and my non thug life - Let them eat dog purpose - Introduction to engineering ethics 2nd edition solution manual - Leonard suspends his friendship with sheldon - 400 word blog soc350 - Who are the major developers of cybersecurity related inventions - Wireshark filter cheat sheet pdf - Abbey college rto manager - Mohr pipette vs serological pipette - Three cups of tea chapter 7 summary - Critical review of journal article example - Managing ethics and social responsibility - Judith lorber believing is seeingSummary - Freedom of information centrelink - Nazif durmaz - 6/20 cromwell road south yarra - World wide fund for nature frightening vs more frightening - P&g japan the sk ii globalization project - Margaret newman nursing theory - Aunt jemima ain t yo mama vine - One angel square architect - Pacific breakers bribie island - Mathscape 9 extension answers - Week 9 Discussion - Dr pepper snapple group competitive advantage - Final Project - What is true about isolines on a weather map - Caerphilly council school admissions - Unwieldy inheritance - Tiger river siberian hot tub manual - WRK 100 assignment - Here are the data for the past 21 months for actual sales of a particular product: - Vertical analysis compares each item on a financial statement with - Is 210 a prime number - Analysis of florida water lab procedure - How do you think others perceive you essay - Final Disc 8 - Escoge la opción correcta para cada oración - Organizational culture and leadership schein 4th edition pdf - Probate fee list leaflet pa3 - How do satellites aid in mapmaking - Valuepro net - Orphan tsunami of 1700 - Wasi sample report - In the zzzz best case, barry minkow was charged with: - External and Internal Environments - Metarteriole and thoroughfare channel - Body language in communication ppt - NIKE: ETHICS VERSUS REPUTATION IN THE #METOO ERA - Accounting terms 1 10 n 30