In this section, we continue our discussion of encryption. We will see how these protocols are used and implemented in standards such as TLS, SSL, IPSec, etc. We will also look at Public Key Infrastructure, and why this is important for modern encryption. We will also look at digital signatures and certificates.
In addition, we will take a look at modern cryptanalysis: how attackers find weaknesses in encryption, and how we can evaluate encryption standards, and asses their risk when weaknesses are discovered.
The (ISC)2 Common Body of Knowledge (CBK) defines the key areas of knowledge for cryptography in this way:
The Cryptography domain addresses the principles, means, and methods of applying mathematical algorithms and data transformation to information to ensure its integrity, confidentiality and authenticity.
The candidate will be expected to know basic concepts within cryptography; public and private key algorithms in terms of their applications and uses; algorithm construction, key distribution and management, and methods of attack; the applications, construction and use of digital signatures to provide authenticity of electronic transactions, and non-repudiation of the parties involved; and the organization and management of the Public Key Infrastructure (PKIs) and digital certificates distribution and management.
Key areas of knowledge:
- Understand the application and use of cryptography
- Understand the cryptographic life cycle (e.g., cryptographic limitations, algorithm/ protocol governance)
- Understand encryption concepts
- Understand key management processes Understand digital signatures
- Understand non-repudiation
- Understand methods of cryptanalytic attacks Use cryptography in network security Use cryptography to maintain application security
- Understand Public Key Infrastructure (PKI) Understand certificate related issues
- Understand information hiding alternatives (e.g., steganography, watermarking)
This week’s topics:
- Applications and Uses of Cryptography
- Encryption Methodologies
- Key Management
- Attacks and Countermeasures
In this unit, plan to:
- Read: pages 190-202 in the Network Security text
- Complete: this week’s written assignment
- Finish: last week’s practical assignment
- Participate: in the weekly discussion forum
- Prepare: for the Case Study Review