CCNA Security 640-554: Chapter 7: Cryptographic Systems
CCNA Security 640-554: Chapter 7: Cryptographic Systems
640-554
Chapter 7: Cryptographic Systems
2
,his eans that a sender - device cannot den% having been the
source of that essage+
It cannot re!udiate. or refute. the validit% of a essage sent+
Authentication
6
During 5orld 5ar II. 6a!an was deci!hering ever% code the
Aericans cae u! with+
A ore elaborate coding s%ste was needed+
,he answer cae in the for of the NavaEo code talkers+
For e0a!le:
S!ell it backwards+
/0a!les include:
'aesar 'i!her
?igen@re 'i!her
Substitution 'i!her
24
3
Clear te%t
FLANK EAST
ATTACK AT DAWN
,he encr%!ted essage becoes *
1
/ncode using a ke% of :+ ,herefore. A becoes a D. 8 an /. * 2
,he clearte0t essage+
IODQN HDVW
DWWDFN DW GDZQ
Ciphered te%t
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
LetIs /ncode using the 'aesar 'i!herJ
25
3
Ciphered te%t
OZ OY IUUR
,he clear te0t essage+
1
$se a shift of > 3(F,>4+ 2
Solve the ci!herte0t+
IT is cool
Clear te%t
LetIs Decode
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M
26
Ciphered te%t
3
IODQN HDVW
DWWDFN DW GDZQ
,he clear te0t essage would be encoded using
a ke% of :+
1
FLANK EAST
ATTACK AT DAWN
Shifting the inner
wheel b% :. then
the A becoes D.
8 becoes /. and
so on+
2
,he clear te0t essage would a!!ear as
follows using a ke% of :+
Clear te%t
'aesar 'i!her Disk
27
For e0a!le:
A sender and receiver have a shared secret ke%: S/'(/,K/L+
Sender uses the ke% to encode: FLANK /AS, A,,A'K A, DA5N+
?igen@re 'i!her
28
/ach ta!e was used onl% once. hence the nae oneAtie !ad+
As long as the ke% ta!e does not re!eat or is not reused. this t%!e of ci!her is
iune to cr%!tanal%tic attack because the available ci!herte0t does not
dis!la% the !attern of the ke%+
?erna 'i!her
2&
8ruteAForce ðod
'i!herte0tAFnl% ðod
KnownAPlainte0t ðod
'hosenAPlainte0t ðod
'hosenA'i!herte0t ðod
&eetAinAtheA&iddle ðod
'r%!tanal%sis ðods
33
An attacker has:
,he ci!herte0t of several essages. all of which have been encr%!ted using
the sae encr%!tion algorith. but the attacker has no knowledge of the
underl%ing !lainte0t+
,he attacker could use statistical anal%sis to deduce the ke%+
An attacker has:
Access to the ci!herte0t of several essages+
Knowledge 3underl%ing !rotocol. file t%!e. or soe characteristic strings4
about the !lainte0t underl%ing that ci!herte0t+
,he !lainte0t is encr%!ted with ever% !ossible ke%. and the results
are stored+
,he ci!herte0t is then decr%!ted using ever% ke%. until one of the results
atches one of the stored values+
&eetAinAtheA&iddle ðod
3&
,here have been ties when one of the disci!lines has been
ahead of the other+
'urrentl%. it is believed that cr%!togra!hers have the edge+
'r%!tolog% R 'r%!togra!h% S 'r%!tanal%sis
44
"304 is:
(elativel% eas% to co!uter for an% given
0+
Fne wa% and not reversible+
,his akes S"AA; slightl% slower than &D<. but the larger
essage digest akes it ore secure against bruteAforce
collision and inversion attacks+
Secure "ash Algorith 3S"A4
5&
&D< versus S"AA;
.ore secure
'ess /ecure
/lo+er 1aster
Algorith# #ust process a 160,!it
!uffer
Algorith# #ust process a 128,!it
!uffer
Co#putation in(ol(es 80 steps Co#putation in(ol(es 64 steps
2ased on .)4 2ased on .)4
/0A,1 .)5
60
For e0a!le:
Authenticating routing !rotocol u!dates+
IPsec ?PNs use &D< and S"AA; in "&A' ode. to !rovide !acket integrit%
and authenticit%+
IFS iages downloaded fro 'isco+co have an &D<Abased checksu to
check the integrit% of downloaded iages+
,A'A'SS uses an &D< hash as the ke% to encr%!t the session+
"&A' and 'isco Products
Key anage!ent
68
Ke% 2eneration:
'aesar to choose the ke% of his ci!her and the Sender-(eceiver chose a
shared secret ke% for the ?igen@re ci!her+
&odern cr%!togra!hic s%ste ke% generation is usuall% autoated+
Ke% ?erification:
Alost all cr%!togra!hic algoriths have soe weak ke%s that should not be
used 3e+g+. 'aesar ci!her (F, B or (F, N<4+
5ith the hel! of ke% verification !rocedures. these ke%s can be regenerated if
the% occur+
Ke% Storage:
&odern cr%!togra!hic s%ste store ke%s in eor%+
Ke% &anageent
70
Ke% /0change:
Ke% anageent !rocedures should !rovide a secure ke% e0change
echanis over an untrusted ediu+
,he ke% length is the easure in bits and the ke%s!ace is the
nuber of !ossibilities that can be generated b% a s!ecific ke%
length+
For each bit added to the D/S ke%. the attacker would re)uire
twice the aount of tie to search the ke%s!ace+
Longer ke%s are ore secure but are also ore resource
intensive and can affect through!ut+
Ke%s!ace
)9/ 3ey
'ength
3eyspac
e
: of ;ossi!le 3eys
56 !it 256 72600060006000600060
00
57 !it 257 14460006000600060006
000
58 !it 258 28860006000600060006
000
5& !it 25& 57660006000600060006
000
73
8ecause both !arties do not have a shared secret. ver% long ke%
lengths ust be used to thwart attackers+
,hese algoriths are resource intensive and slower to e0ecute+
(ecoendations:
'hange ke%s fre)uentl% to hel! !revent bruteAforce attacks+
$se a secure channel to counicate the D/S ke% fro the sender to the
receiver+
D/S Securit% (ating
&3
A/S is now available in the latest 'isco router iages that have
IPsec D/S-:D/S functionalit%+
Advanced /ncr%!tion Standard 3A/S4
&8
A/S Scorecard
'o+ 8esource Consu#ption
14& >rillion years
>i#e to crac-
4Assu#ing a co#puter could try 255
-eys per second5
0igh /peed
1286 1&26 and 256 3ey siDe 4in !its5
/y##etric >ype of Algorith#
Cfficial /tandard since 2001 >i#eline
Ad(anced 9ncryption /tandard )escription
&&
A/S /0a!le
In this e0a!le. the
S/'(/,K/L ke% and
!lainte0t are entered+
,he% are now encr%!ted using
;N= A/S+
An atte!t at deci!hering the
te0t using a lowercase. and
incorrect ke%+
A second atte!t at
deci!hering the te0t using the
correct ke% dis!la%s the
original !lainte0t+
100
2o! and Alice agree to use a !ase nu#!er gF5 and pri#e nu#!er
pF23
For instance:
98 od 39 would evaluate to 2+
>he result 425 is the sa#e for !oth Alice and 2o!
>hey +ill no+ use this as the secret -ey for encryption
Alice 2o!
Calc Calc
15
56#od 23 F 8
515#od 23 F 1&
1&6#od 23 F 2
815#od 23 F 2
56 23 56 23
/ecret /ecret /hared /hared
6
113
2>H:
,he initial secret integer used b% Alice 364 and 8ob 3154 are ver%. ver% large
nubers 3;BNG bits4+
8 !its R 10101010
1024 !its F
Alice and 8ob D" Ke% /0change
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
101010101010101010101010101010101010101010101010101010101010101010101010101010101010
1010101010101010101010101010101010101010101010101010101010101010
%u&lic Key
Cryptography
115
,he ke% that is used for encr%!tion is different fro the ke% that is
used for decr%!tion+
"owever. the decr%!tion ke% cannot. in an% reasonable aount of tie. be
calculated fro the encr%!tion ke% and vice versa+
Since onl% one host has the !rivate ke%. onl% that host could have
encr%!ted the essage. !roviding authentication of the sender+
Authentication
120
As%etric Algoriths for Authentication
2 Alice trans#its the encrypted #essage to 2o!
1 Alice encrypts a #essage +ith her pri(ate -ey
3 >o (erify that the #essage actually ca#e fro# Alice6 2o! re<uests and ac<uires
Alice7s pu!lic -ey
4 2o! uses the pu!lic -ey to successfully decrypt the #essage and authenticate that
the #essage did6 indeed6 co#e fro# Alice
121
5hen the !ublic ke% is used to encr%!t the data. the !rivate ke%
ust be used to decr%!t the data+
Fnl% one host has the !rivate ke% guaranteeing confidentialit%+
'onfidentialit%
122
As%etric Algoriths for 'onfidentialit%
2 Alice uses 2o!7s pu!lic -ey to encrypt a #essage using an agreed,upon algorith#
1 Alice as-s 2o! for his pu!lic -ey and 2o! sends it to her
3 Alice sends the encrypted #essage to 2o!
4 2o! uses his pri(ate -ey to decrypt and re(eal the #essage
123
In ;DDG. the $+S+ NIS, selected the DSA as the Digital Signature
Standard 3DSS4+
DSA is based on the discrete logarith !roble and can onl% !rovide digital
signatures+
'ertificates:
Published !ublic inforation containing the binding between the naes and
!ublic ke%s of entities+
'ertificate authorit%:
A trusted thirdA!art% entit% that issues certificates+
,he certificate of a user is alwa%s signed b% a 'A+
/ver% 'A also has a certificate containing its !ublic ke%. signed b% itself+
,his is called a 'A certificate or. ore !ro!erl%. a selfAsigned 'A certificate+
PKI ,ers
140
?endors 'ertificate
http://+++(erisignco#
http://+++entrustco#
http://+++(eriDon!usinessco#/
http://+++rsaco#/
http://+++no(ellco#
http://+++#icrosoftco#
141
PKI /0a!le
%KI Stan$ar$s
143
,he first ste! of the user is to securel% obtain a co!% of the !ublic
ke% of the 'A+
,he !ublic ke% verifies all the certificates issued b% the 'A and is vital for the
!ro!er o!eration of the PKI+