SlideShare uma empresa Scribd logo
1 de 13
Introduction to
cryptography II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Hashing basics.
– Additional cryptography topics.
PACE-IT.
Page 4
Introduction to cryptography II.
Page 5
The idea behind hashing is
to create a method of easily
verifying the integrity (or
authenticity) of a set of data.
The process involves using an algorithm on the data to create a
unique value that can be used to verify the data set. This value is
known as the hashed value (or message digest). No matter how
many times the data set is run through the hashing algorithm, the
same hashed value is derived (as long as the same algorithm is
used).
The message digest can also be known as a one-way hashed
value. This is because it is impossible to take a hashed value and
determine what the data is—helping to keep the data secure.
Introduction to cryptography II.
Page 6
– Hashing concepts.
» Hashing algorithms do not work on the header of a file.
• No matter how many times the header of the file changes
(e.g., changing the name of a file), the hashed value of the
data remains the same.
» The hashed value returned is a fixed length that depends on
which algorithm is used.
• A specific algorithm will always generate the same size hash.
» It is theoretically possible to recreate a hashed value by running
enough data through the hashing algorithm.
• When two hashed values are the same, it is called a collision.
• This is the concept behind a birthday attack.
– HMAC (hash-based message
authentication code).
» The process of using a secret key (a data value only known to
the communicating parties) combined with the data set to
derive the hashed value.
• Provides an authentication check—verifying the identity of the
sender—as well as an integrity check of the data.
Introduction to cryptography II.
Page 7
– Common hashing algorithms.
» MD (Message Digest): created by Ron Rivest.
• MD5 is the current standard used and always returns a 128-
bit hashed value.
» SHA (Secure Hash Algorithm) created by the National Security
Agency (NSA).
• SHA-1 is the most popular of the versions of SHA and returns
a 160-bit hashed value.
• SHA-256 is a newer version that returns a 256-bit hashed
value.
• SHA-512 is also a newer version that returns a 512-bit
hashed value.
Introduction to cryptography II.
Page 8
Introduction to cryptography II.
Page 9
– Key escrow.
» The process of storing or giving encryption keys to a third party;
the third party can then use the keys to decrypt any messages
that use those keys (in some cases, governmental agencies
have required the turning over of encryption keys to aid in
investigations).
• Highly controversial.
– Ephemeral key.
» A temporary key that is used to encrypt a single message
within a communication channel.
• Reduces the chances that a hacker will acquire a key set and
be able to decrypt the messages.
– Perfect forward secrecy.
» A process that generates a random public key (ephemeral key)
for each session, so that the private key exchange can be kept
secure.
Introduction to cryptography II.
Page 10
– Digital signature.
» Created to digitally sign messages in order to prove the
integrity of the sender.
• A message digest is created from a set of data and then
encrypted with the sender’s private key. The receiver decrypts
the hashed value with the sender’s public key and then
verifies the hashed values.
• Also provides a means of non-repudiation—the sender can’t
deny that he or she is the entity that sent the message.
– Elliptic curve.
» A newer asymmetrical encryption algorithm that employs Diffie-
Hellman for the exchange of keys and the Digital Signature
Algorithm (DSA) for the digital signature.
– Quantum cryptography.
» Encryption standard that is used with fiber optic communication
to determine if the message has been intercepted.
• Relies upon the fact that any interaction with the photons in
transit will cause the state of the photons to change.
Introduction to cryptography II.
Page 11
Introduction to cryptography II.
The idea behind hashing is to create a method of easily verifying the
integrity (or authenticity) of a set of data. Hashing only works on data, not
on file headers. Hashing algorithms always return the same size hashed
value. HMAC can be used for both authentication and integrity purposes.
Common hashing algorithms include: MD5, SHA-1, SHA-256, and SHA-
512.
Topic
Hashing basics.
Summary
Key escrow is where a third party stores the keys used for encryption
purposes (a very controversial topic). Ephemeral keys are where a random
public key is generated on a single message in a communication session.
Perfect forward secrecy is used to aid in the encryption key exchange
process by using ephemeral keys. Digital signatures are used to prove the
integrity of the sender and can be used for non-repudiation purposes.
Elliptic curve is a newer asymmetric encryption standard that uses a
combination of DH and DSA. Quantum cryptography is used on fiber optic
networks and can be used to determine if the message has been viewed by
unauthorized parties.
Additional cryptography
topics.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
C02
C02C02
C02
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 

Destaque

Destaque (10)

PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security ControlsPACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security Controls
 

Semelhante a PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)

The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd Iaetsd
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
paperpublications3
 

Semelhante a PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2) (20)

The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Network Security
Network SecurityNetwork Security
Network Security
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash technique
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
cryptography
cryptographycryptography
cryptography
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Hashing basics. – Additional cryptography topics. PACE-IT.
  • 4. Page 4 Introduction to cryptography II.
  • 5. Page 5 The idea behind hashing is to create a method of easily verifying the integrity (or authenticity) of a set of data. The process involves using an algorithm on the data to create a unique value that can be used to verify the data set. This value is known as the hashed value (or message digest). No matter how many times the data set is run through the hashing algorithm, the same hashed value is derived (as long as the same algorithm is used). The message digest can also be known as a one-way hashed value. This is because it is impossible to take a hashed value and determine what the data is—helping to keep the data secure. Introduction to cryptography II.
  • 6. Page 6 – Hashing concepts. » Hashing algorithms do not work on the header of a file. • No matter how many times the header of the file changes (e.g., changing the name of a file), the hashed value of the data remains the same. » The hashed value returned is a fixed length that depends on which algorithm is used. • A specific algorithm will always generate the same size hash. » It is theoretically possible to recreate a hashed value by running enough data through the hashing algorithm. • When two hashed values are the same, it is called a collision. • This is the concept behind a birthday attack. – HMAC (hash-based message authentication code). » The process of using a secret key (a data value only known to the communicating parties) combined with the data set to derive the hashed value. • Provides an authentication check—verifying the identity of the sender—as well as an integrity check of the data. Introduction to cryptography II.
  • 7. Page 7 – Common hashing algorithms. » MD (Message Digest): created by Ron Rivest. • MD5 is the current standard used and always returns a 128- bit hashed value. » SHA (Secure Hash Algorithm) created by the National Security Agency (NSA). • SHA-1 is the most popular of the versions of SHA and returns a 160-bit hashed value. • SHA-256 is a newer version that returns a 256-bit hashed value. • SHA-512 is also a newer version that returns a 512-bit hashed value. Introduction to cryptography II.
  • 8. Page 8 Introduction to cryptography II.
  • 9. Page 9 – Key escrow. » The process of storing or giving encryption keys to a third party; the third party can then use the keys to decrypt any messages that use those keys (in some cases, governmental agencies have required the turning over of encryption keys to aid in investigations). • Highly controversial. – Ephemeral key. » A temporary key that is used to encrypt a single message within a communication channel. • Reduces the chances that a hacker will acquire a key set and be able to decrypt the messages. – Perfect forward secrecy. » A process that generates a random public key (ephemeral key) for each session, so that the private key exchange can be kept secure. Introduction to cryptography II.
  • 10. Page 10 – Digital signature. » Created to digitally sign messages in order to prove the integrity of the sender. • A message digest is created from a set of data and then encrypted with the sender’s private key. The receiver decrypts the hashed value with the sender’s public key and then verifies the hashed values. • Also provides a means of non-repudiation—the sender can’t deny that he or she is the entity that sent the message. – Elliptic curve. » A newer asymmetrical encryption algorithm that employs Diffie- Hellman for the exchange of keys and the Digital Signature Algorithm (DSA) for the digital signature. – Quantum cryptography. » Encryption standard that is used with fiber optic communication to determine if the message has been intercepted. • Relies upon the fact that any interaction with the photons in transit will cause the state of the photons to change. Introduction to cryptography II.
  • 11. Page 11 Introduction to cryptography II. The idea behind hashing is to create a method of easily verifying the integrity (or authenticity) of a set of data. Hashing only works on data, not on file headers. Hashing algorithms always return the same size hashed value. HMAC can be used for both authentication and integrity purposes. Common hashing algorithms include: MD5, SHA-1, SHA-256, and SHA- 512. Topic Hashing basics. Summary Key escrow is where a third party stores the keys used for encryption purposes (a very controversial topic). Ephemeral keys are where a random public key is generated on a single message in a communication session. Perfect forward secrecy is used to aid in the encryption key exchange process by using ephemeral keys. Digital signatures are used to prove the integrity of the sender and can be used for non-repudiation purposes. Elliptic curve is a newer asymmetric encryption standard that uses a combination of DH and DSA. Quantum cryptography is used on fiber optic networks and can be used to determine if the message has been viewed by unauthorized parties. Additional cryptography topics.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.