921 likes | 1.06k Views
This chapter introduces cryptographic services including authentication, integrity, and confidentiality in secure communications. It covers cryptography, cryptoanalysis, and cryptology concepts such as creating ciphertext, cryptanalysis methods, and making/breaking secret codes. Additionally, it examines basic integrity and authenticity aspects like cryptographic hashes, MD5, SHA-1, HMAC for authenticity, and key management components. Furthermore, it delves into encryption algorithms such as DES, 3DES, AES, SEAL, and RC for providing confidentiality in data communications.
E N D
Chapter 7:Cryptographic Systems CCNA Security v2.0
7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary Chapter Outline
Section 7.1:Cryptographic Services Upon completion of this section, you should be able to: • Explain the requirements of secure communications including integrity, authentication, and confidentiality. • Explain cryptography. • Describe cryptoanalysis. • Describe cryptology.
Creating Ciphertext Ciphertext can be creating using several methods: • Transposition • Substitution • One-time pad
Substitution Ciphers xxxx
Methods for Cracking Code Methods used for cryptanalysis: • Brute-force method • Ciphertext method • Known-Plaintext method • Chosen-Plaintext method • Chosen-Ciphertext method • Meet-in-the-Middle method
Methods for Cracking Code Frequency Analysis of the English Alphabet Deciphering Using Frequency Analysis
Section 7.2:Basic Integrity and Authenticity Upon completion of the section, you should be able to: • Describe the purpose of cryptographic hashes. • Explain how MD5 and SHA-1 are used to secure data communications. • Describe authenticity with HMAC. • Describe the components of key management.
Types of Cryptographic Keys Types of cryptographic keys: • Symmetric keys • Asymmetric keys • Digital signatures • Hash keys
Section 7.3:Confidentiality Upon completion of the section, you should be able to: • Explain how encryption algorithms provide confidentiality. • Explain the function of the DES, 3DES, and the AES algorithms . • Describe the function of the Software Encrypted Algorithm (SEAL) and the Rivest ciphers (RC) algorithms.