CISSP Session 02
CISSP Session 02
the CISSP
Bootcamp
Your instructor:
Michael J Shannon
CISSP #42221 / #524169,
CCNP-Security, PCNSE7,
AWS Certified Security – Specialty, Class will begin at 10:00
OpenFAIR, and A.M. Central Standard
ITIL 4 Managing Professional Time (CST)
• Cryptography
• Study and practice of securing
communications
• Encryption and hashing
• Cryptanalysis
• Study and practice of exploiting
weaknesses in communications
• Privacy
(confidentiality)
• Encrypt with public key
• Decrypt with private key
• Origin
authentication
• Encrypt with private key
• Decrypt with public key
Asymmetric Key Algorithms
• Slower (not suitable for bulk data encryption)
• Design is based on factoring the product of large prime numbers
• Key management is simpler and more secure
• Best suited for digital signatures and session key exchange or agreement
protection services
• RSA (most popular commercial), DSA, Elliptic curve DSA, PGP/GPG, Diffie-Hellman
Elliptic curve
Algorithms
• Rich mathematical
functions based on
points on a curve
• Most efficient and
smaller keys provide
exceptional strength
• 3,072 standard key =
256 elliptic curve key
• Common uses
• Digital signatures
• Key distribution
• Encryption
Diffie-Hellman Key Exchange
• The first key agreement asymmetric algorithm used for
generating shared secret keys over an untrusted channel
• Once the two parties securely develop shared secrets then
they can use the keys to derive subsequent keys
• These keys can then be used with symmetric-key
algorithms to transmit information in a protected way
• DH can also be used to establish public and private keys;
however, RSA tends to be used instead
• The RSA algorithm is also capable of signing public-key certificates,
whereas the Diffie-Hellman key exchange is not
Digital
Signatures
provide
Authenticity
Integrity &
Nonrepudiation
Digital Signatures
Equivalent to handwritten signatures
• Key
• Random private/public pair
• Hash algorithm
• MD5, SHA1, SHA2+
• Signing algorithm
• Digital Signature Algorithm (DSA)
• Rivest, Shamir, Adelman (RSA)
One-Time Pad (OTP)
• Based on the Vernam cipher
• One-time random pre-shared key that is
the same size as the message being sent
• The key should never be used more than
once and must be kept secret
• The key is added to plaintext bits using
modular addition
• Considered unbreakable when
implemented properly with random keys
• Pure random keys are difficult to
generate
Perfect Forward
Secrecy
Also called “forward secrecy”
• Mathematical attacks
• Best example is factoring the modulus
• Although 1024-bit RSA is adequate, a
modulus of 2048 – 4096 bits is highly
recommended today
• Side-channel attacks
• information about the private key is
leaked via physical channels like power
consumption (SPA) and timing behavior
Key Generation
• Keys can be generated through the key manager or by a
trusted third party, which must use a cryptographically
secure random bit generator Cryptographic
• The keys, along with all their attributes, will then be
stored in the key storage database (which must be
Key Lifecycle
encrypted by a master key)
• Attributes include name, activation date, size, and
instance
• A key can be activated upon its creation or set to be
activated automatically or manually later
Key Backup and Storage
• In order to recover a key that has been lost during its
use, a secure backup copy should be made available
• Backup keys can be stored in a protected form on
external media (CD, USB drive, etc.), a hardware
security module (HSM), or by using an existing Cryptographic
traditional backup solution (local or networked)
Key Lifecycle
• When a symmetric key or an asymmetric private key is
being backed up, it must be also encrypted and stored
Key Distribution and Loading
• The objective is to install the new key into a secure
cryptographic device, either manually or electronically
• For manual distribution, keys must be distributed and Cryptographic
loaded in key shares to avoid the full key being viewed
in the clear
Key Lifecycle
• When symmetric keys are installed, it is recommended
that they be encrypted by a public key or key-
encryption key prior to being delivered for deployment
• The key should be deployed and tested for a certain
time period ensure that operations are successful, in
order to avoid any potential data loss or theft
Normal Use and Replacement
• The key management system should allow an activated
key to be retrieved by authorized systems and users
• It should also effortlessly manage current and past
instances of the encryption key
• The key manager will replace a key automatically
Cryptographic
through a previously established schedule or if it is Key Lifecycle
suspected of compromise
• When replacing keys, the goal is to bring a replacement
key into active use by the system, and to also convert all
stored, secured data to the new key
Archiving Keys
• Archival refers to off-line long-term storage for keys
that are no longer in operation Cryptographic
• Long-term storage (i.e. Gemalto HSM or CloudHSM)
Key Lifecycle
• These keys usually have data associated with them that
may be needed for future reference, such as long-term
storage of emails
• There may also be associated data in other external
systems
• When archiving a key, it must be encrypted to add
security
• Before a key is archived, it should be proven that no
data is still being secured with the old key
Key Disposal (Disposition)
• The last phase is the end of the key's life-cycle, where
all instances, or certain instances, are completely Cryptographic
removed
Key Lifecycle
• The end of life for a key should only occur after an
adequately long Archival phase, and after adequate
analysis to ensure that loss of the key will not
correspond to loss of data or other keys
• There are three ways to remove a key from operation:
• Key destruction
• Key deletion
• Key termination
Key Stretching
Strengthens weak passwords or keys