Chapter 7: Cryptographic Systems

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Chapter 7: Cryptographic Systems
5 (100%) 1 vote

Instructor Materials – Chapter 7: Cryptographic Systems

Chapter Outline:

7.0 Introduction
7.1 Cryptographic Services
7.2 Basic Integrity and Authenticity
7.3 Confidentiality
7.4 Public Key Cryptography
7.5 Summary

Section 7.1: Cryptographic Services

Topic 7.1.1: Securing Communications

  • Authentication, Integrity, and Confidentiality
  • Authentication
  • Data Integrity
  • Data Confidentiality

Topic 7.1.2: Cryptography

  • Creating Ciphertext
  • Transposition Ciphers
  • Substitution Ciphers
  • One-Time Pad Ciphers

Topic 7.1.3: Cryptanalysis

  • Cracking Code
  • Methods for Cracking Code
  • Methods for Cracking Code

Topic 7.1.4: Cryptology

  • Making and Breaking Secret Codes
  • Cryptanalysis
  • The Secret is in the Keys

Section 7.2: Basic Integrity and Authenticity

Topic 7.2.1: Cryptographic Hashes

  • Cryptographic Hash Function
  • Cryptographic Hash Function Properties
  • Well-Known Hash Functions

Topic 7.2.2: Integrity with MD5, SHA-1, and SHA-2

  • Message Digest 5 Algorithm
  • Secure Hash Algorithm
  • MD5 Versus SHA

Topic 7.2.3: Authenticity with HMAC

  • Keyed-Hash Message Authentication Code
  • HMAC Operation
  • Hashing in Cisco Products

Topic 7.2.4: Key Management

  • Characteristics of Key Management
  • Key Length and Keyspace
  • The Keyspace
  • Types of Cryptographic Keys
  • Choosing Cryptographic Keys

Section 7.3: Confidentiality

Topic 7.3.1: Encryption

  • Two Classes of Encryption Algorithms
  • Symmetric and Asymmetric Encryption
  • Symmetric Encryption
  • Symmetric Block Ciphers and Stream Ciphers
  • Choosing an Encryption Algorithm

Topic 7.3.2: Data Encryption Standard

  • DES Symmetric Encryption
  • DES Summary
  • Improving DES with 3DES
  • 3DES Operation
  • AES Origins
  • AES Summary

Topic 7.3.3: Alternate Encryption Algorithms

  • Software-Optimized Encryption Algorithm (SEAL)
  • RC Algorithms

Topic 7.3.4: Diffie-Hellman Key Exchange

  • Diffie-Hellman (DH) Algorithm
  • DH Operation

Section 7.4: Public Key Cryptography

Topic 7.4.1: Symmetric Versus Asymmetric Encryption

  • Asymmetric Key Algorithms
  • Public Key + Private Key = Confidentiality
  • Private Key + Public Key = Authenticity
  • Asymmetric Algorithms
  • Types of Asymmetric Algorithms

Topic 7.4.2: Digital Signatures

  • Using Digital Signatures
  • Code Signing
  • Digital Certificates
  • Using Digital Certificates
  • Digital Signature Algorithms

Topic 7.4.3: Public Key Infrastructure

  • Public Key Infrastructure Overview
  • PKI Framework
  • Certificate Authorities
  • Interoperability of Different PKI Vendors
  • Public-Key Cryptography Standards
  • Simple Certificate Enrollment Protocol
  • PKI Topologies
  • Registration Authority
  • Digital Certificates and CAs

Section 7.5: Summary

Chapter Objectives:

  • Explain the areas of cryptology.
  • Explain to two kinds of encryption algorithms.

 

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.