Instructor Materials – Chapter 7: Cryptographic Systems
Chapter Outline:
7.0 Introduction
7.1 Cryptographic Services
7.2 Basic Integrity and Authenticity
7.3 Confidentiality
7.4 Public Key Cryptography
7.5 Summary
Section 7.1: Cryptographic Services
Topic 7.1.1: Securing Communications
- Authentication, Integrity, and Confidentiality
- Authentication
- Data Integrity
- Data Confidentiality
Topic 7.1.2: Cryptography
- Creating Ciphertext
- Transposition Ciphers
- Substitution Ciphers
- One-Time Pad Ciphers
Topic 7.1.3: Cryptanalysis
- Cracking Code
- Methods for Cracking Code
- Methods for Cracking Code
Topic 7.1.4: Cryptology
- Making and Breaking Secret Codes
- Cryptanalysis
- The Secret is in the Keys
Section 7.2: Basic Integrity and Authenticity
Topic 7.2.1: Cryptographic Hashes
- Cryptographic Hash Function
- Cryptographic Hash Function Properties
- Well-Known Hash Functions
Topic 7.2.2: Integrity with MD5, SHA-1, and SHA-2
- Message Digest 5 Algorithm
- Secure Hash Algorithm
- MD5 Versus SHA
Topic 7.2.3: Authenticity with HMAC
- Keyed-Hash Message Authentication Code
- HMAC Operation
- Hashing in Cisco Products
Topic 7.2.4: Key Management
- Characteristics of Key Management
- Key Length and Keyspace
- The Keyspace
- Types of Cryptographic Keys
- Choosing Cryptographic Keys
Section 7.3: Confidentiality
Topic 7.3.1: Encryption
- Two Classes of Encryption Algorithms
- Symmetric and Asymmetric Encryption
- Symmetric Encryption
- Symmetric Block Ciphers and Stream Ciphers
- Choosing an Encryption Algorithm
Topic 7.3.2: Data Encryption Standard
- DES Symmetric Encryption
- DES Summary
- Improving DES with 3DES
- 3DES Operation
- AES Origins
- AES Summary
Topic 7.3.3: Alternate Encryption Algorithms
- Software-Optimized Encryption Algorithm (SEAL)
- RC Algorithms
Topic 7.3.4: Diffie-Hellman Key Exchange
- Diffie-Hellman (DH) Algorithm
- DH Operation
Section 7.4: Public Key Cryptography
Topic 7.4.1: Symmetric Versus Asymmetric Encryption
- Asymmetric Key Algorithms
- Public Key + Private Key = Confidentiality
- Private Key + Public Key = Authenticity
- Asymmetric Algorithms
- Types of Asymmetric Algorithms
Topic 7.4.2: Digital Signatures
- Using Digital Signatures
- Code Signing
- Digital Certificates
- Using Digital Certificates
- Digital Signature Algorithms
Topic 7.4.3: Public Key Infrastructure
- Public Key Infrastructure Overview
- PKI Framework
- Certificate Authorities
- Interoperability of Different PKI Vendors
- Public-Key Cryptography Standards
- Simple Certificate Enrollment Protocol
- PKI Topologies
- Registration Authority
- Digital Certificates and CAs
Section 7.5: Summary
Chapter Objectives:
- Explain the areas of cryptology.
- Explain to two kinds of encryption algorithms.