Encryption Fundamentals, Techniques and Applications
Encryption Fundamentals, Techniques and Applications
Encryption Fundamentals,
2. Cybersecurity Roles
3. Cybersecurity Controls
4. Security Architecture Principles
5. Encryption Fundamentals, Techniques
Encryption Fundamentals
• Encryption is the process of converting a plaintext
message into a secure-coded form of text, called
ciphertext.
• The ciphertext cannot be understood without
converting back, via decryption—the reverse process
—to plaintext.
• This is done via a mathematical function and a special
encryption/decryption password called the key.
• In many countries, encryption is subject to
governmental laws and regulations that limit the key
size or define what may not be encrypted.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 2
Section 3: Security Architecture Principles
Encryption Fundamentals
• Encryption is part of a broader science of secret
languages called cryptography, which is generally
used to:
• Protect information stored on computers from
unauthorized viewing and manipulation
• Protect data in transit over networks from
unauthorized interception and manipulation
• Deter and detect accidental or intentional
alterations of data
• Verify authenticity of a transaction or document
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 3
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 4
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 5
Section 3: Security Architecture Principles
Key Systems
• There are two types of cryptographic systems:
• Symmetric Key Systems—These use single,
secret, bidirectional keys that encrypt and decrypt.
• Asymmetric Key Systems—These use pairs of
unidirectional, complementary keys that only
encrypt or decrypt. Typically, one of these keys is
secret, and the other is publicly known.
• Public key systems are asymmetric cryptographic
systems.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 6
Section 3: Security Architecture Principles
Encryption Techniques
• Symmetric (Private) Key Encryption
• There are two main advantages to symmetric key
cryptosystems such as DES or AES:
• The user only has to remember/know one key for
both encryption and decryption.
• Symmetric key cryptosystems are generally less
complicated and, therefore, use up less processing
power than asymmetric techniques. They are
ideally suited for bulk data encryption.
• The disadvantages of this approach include:
• Difficulty distributing keys
• Limitations of shared secret
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 7
Section 3: Security Architecture Principles
Encryption Techniques
• Asymmetric (Private) Key Encryption
• The key that was used to encrypt the data cannot
be used to decrypt it. Thus, the keys are
asymmetric in that they are inversely related to
each other.
• Asymmetric keys are often used for short
messages such as encrypting DES symmetric
keys or creating digital signatures.
• In theory, a message that has been encrypted
twice, first by the sender’s secret key, and second
by the receiver’s public key, achieves both
authentication and confidentiality objectives, but it
is not commonly used because it could generate
performance issues.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 8
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 9
Section 3: Security Architecture Principles
Quantum Cryptography
• Quantum cryptography is the next generation of
cryptography that may solve some of the existing
problems associated with current cryptographic
systems, specifically the random generation and
secure distribution of symmetric cryptographic keys.
• t is based on a practical application of the
characteristics of the smallest “grains” of light
(photons) and the physical laws governing their
generation, propagation and detection.
• Initial commercial usage has already started now that
the laboratory research phase has been completed.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 10
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 11
Section 3: Security Architecture Principles
Digital Signature
• A digital signature is an electronic identification of a
person or entity created by using a public key
algorithm.
• To verify the integrity of the data, a cryptographic
hashing algorithm, called a checksum, is computed
against the entire message or electronic document,
which generates a small fixed string message, usually
about 128 bits in length.
• This process, also referred to as a digital signature
algorithm, creates a message digest (i.e., smaller
extrapolated version of the original message).
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 12
Section 3: Security Architecture Principles
Digital Signature
• Digital signature is a cryptographic method that
ensures:
• Data integrity—Any change to the plaintext
message would result in the recipient failing to
compute the same message hash.
• Authentication—The recipient can ensure that the
message has been sent by the claimed sender
since only the claimed sender has the secret key.
• Nonrepudiation—The claimed sender cannot later
deny generating and sending the message.
• Digital signatures and public key encryption are
vulnerable to man-in-the-middle attacks wherein the
sender’s digital signature private key and public key
may be faked.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 13
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 14
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 15
Section 3: Security Architecture Principles
Stored Data
• Encryption is an effective and increasingly practical
way to restrict access to confidential information while
in storage.
• Encryption can fill the security gap, and it can also
protect data from hackers who, by means of malicious
software, can obtain systems administration rights.
• Encryption also helps to protect data when a computer
or a disk falls into the wrong hands.
• Many email encryption programs can also be applied
to stored data. There are also some encryption
products that focus on file protection for computers
and PDAs.
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 16
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 17
Section 3: Security Architecture Principles
Encryption Applications
• The use of cryptosystems by applications, for example
in email and Internet transactions, generally involves a
combination of private/public key pairs, secret keys,
hash functions and digital certificates.
• The purpose of applying these combinations is to
achieve confidentiality, message integrity or
nonrepudiation by either the sender or recipient.
• Using his/her secret key, the sender then will encrypt
the message.
• Secure Sockets Layer (SSL) and Transport Layer
Security (TLS)—These are cryptographic protocols
that provide secure communications on the Internet
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 18
Section 3: Security Architecture Principles
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 19
Section 3: Security Architecture Principles
Lecture 5
Lecture: Dr. Gat, S.Kom., M.Kom Copyright © 2015 ISACA . All rights reserved. 20