Identify the Three Different Types of Cryptography - Symmetric cryptography is based upon the concept of a shared secret or key.
- A symmetric cryptography is based upon a key that can be made openly available to the public, yet still provide security.
- One-way, or hashing, cryptography takes data and enciphers it. However, there is no way to decipher it and no key.
Recognize the Current Cryptographic Algorithms - Hashing
- SHA
- MD (Message Digest)
- MD2
- MD4
- MD5
- Symmetric
- DES (Data Encryption Standard)
- 3DES
- AES (Advanced Encryption Standard)
- CAST
- RC (Rivest Cipher)
- RC2
- RC4
- RC5
- RC6
- Blowfish
- IDEA
- Asymmetric
- RSA
- Diffie-Hellman
- ElGamal
- ECC
Show How Cryptography Is Used for Security - Confidentiality is gained because encryption is very good at scrambling information to make it look like random noise, when in fact a key can decipher the message and return it to its original state.
- Integrity is gained because hashing algorithms are specifically designed to check integrity. They can reduce a message to a mathematical value that can be independently calculated, guaranteeing that any message alteration would change the mathematical value.
- Nonrepudiation is the property of not being able to claim that you did not send the data. This property is gained because of the properties of private keys.
- Authentication, or being able to prove you are you, is achieved through the private keys involved in digital signatures.
- Digital Signatures, combining multiple types of encryption, provide an authentication method verified by a third party, allowing you to use them as if you were actually signing the document with your regular signature.
|