ccna security v2.0 chapter 7: cryptographic systems
TRANSCRIPT
![Page 1: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/1.jpg)
CCNA Security v2.0
Chapter 7:
Cryptographic Systems
![Page 2: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/2.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Chapter Outline
7.0 Introduction
7.1 Cryptographic Services
7.2 Basic Integrity and Authenticity
7.3 Confidentiality
7.4 Public Key Cryptography
7.5 Summary
![Page 3: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/3.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Section 7.1:Cryptographic Services
Upon completion of this section, you should be able to:
• Explain the requirements of secure communications including integrity, authentication, and confidentiality.
• Explain cryptography.
• Describe cryptoanalysis.
• Describe cryptology.
![Page 4: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/4.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
Topic 7.1.1:Securing Communications
![Page 5: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/5.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Authentication, Integrity, and Confidentiality
![Page 6: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/6.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Authentication
![Page 7: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/7.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Data Integrity
![Page 8: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/8.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Data Confidentiality
![Page 9: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/9.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9
Topic 7.1.2:Cryptography
![Page 10: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/10.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Creating Ciphertext
Ciphertext can be creating using several methods:
• Transposition
• Substitution
• One-time pad
![Page 11: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/11.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Transposition Ciphers
![Page 12: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/12.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Substitution Ciphers
xxxx
![Page 13: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/13.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
One-Time Pad Ciphers
![Page 14: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/14.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 14
Topic 7.1.3:Cryptanalysis
![Page 15: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/15.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Cracking Code
![Page 16: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/16.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Methods for Cracking Code
Methods used for cryptanalysis:
• Brute-force method
• Ciphertext method
• Known-Plaintext method
• Chosen-Plaintext method
• Chosen-Ciphertext method
• Meet-in-the-Middle method
![Page 17: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/17.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Methods for Cracking Code
Frequency Analysis of the English Alphabet
Deciphering Using Frequency Analysis
![Page 18: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/18.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 18
Topic 7.1.4:Cryptology
![Page 19: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/19.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Making and Breaking Secret Codes
![Page 20: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/20.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Cryptanalysis
![Page 21: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/21.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
The Secret is in the Keys
![Page 22: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/22.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Section 7.2:Basic Integrity and Authenticity
Upon completion of the section, you should be able to:
• Describe the purpose of cryptographic hashes.
• Explain how MD5 and SHA-1 are used to secure data communications.
• Describe authenticity with HMAC.
• Describe the components of key management.
![Page 23: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/23.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23
Topic 7.2.1:Cryptographic Hashes
![Page 24: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/24.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Cryptographic Hash Function
![Page 25: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/25.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Cryptographic Hash Function Properties
![Page 26: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/26.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Well-Known Hash Functions
![Page 27: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/27.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 27
Topic 7.2.2:Integrity with MD5, SHA-1, and SHA-2
![Page 28: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/28.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Message Digest 5 Algorithm
![Page 29: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/29.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Secure Hash Algorithm
![Page 30: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/30.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
MD5 Versus SHA
![Page 31: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/31.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 31
Topic 7.2.3:Authenticity with HMAC
![Page 32: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/32.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Keyed-Hash Message Authentication Code
![Page 33: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/33.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
HMAC Operation
![Page 34: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/34.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Hashing in Cisco Products
![Page 35: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/35.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
Topic 7.2.4:Key Management
![Page 36: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/36.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Characteristics of Key Management
![Page 37: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/37.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Key Length and Keyspace
![Page 38: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/38.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
The Keyspace
![Page 39: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/39.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Types of Cryptographic Keys
Types of cryptographic keys:
• Symmetric keys
• Asymmetric keys
• Digital signatures
• Hash keys
![Page 40: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/40.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Choosing Cryptographic Keys
![Page 41: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/41.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Section 7.3:Confidentiality
Upon completion of the section, you should be able to:
• Explain how encryption algorithms provide confidentiality.
• Explain the function of the DES, 3DES, and the AES algorithms .
• Describe the function of the Software Encrypted Algorithm (SEAL) and the Rivest ciphers (RC) algorithms.
![Page 42: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/42.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42
Topic 7.3.1:Encryption
![Page 43: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/43.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Two Classes of Encryption Algorithms
![Page 44: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/44.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Symmetric and Asymmetric Encryption
![Page 45: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/45.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Symmetric Encryption
![Page 46: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/46.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Symmetric Block Ciphers and Stream Ciphers
![Page 47: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/47.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Choosing an Encryption Algorithm
![Page 48: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/48.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 48
Topic 7.3.2:Data Encryption Standard
![Page 49: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/49.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
DES Symmetric Encryption
![Page 50: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/50.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
DES Summary
![Page 51: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/51.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Improving DES with 3DES
![Page 52: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/52.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
3DES Operation
![Page 53: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/53.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
AES Origins
![Page 54: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/54.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
AES Summary
![Page 55: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/55.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 55
Topic 7.3.3:Alternate Encryption Algorithms
![Page 56: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/56.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Software-Optimized Encryption Algorithm (SEAL)
SEAL has several restrictions:
• The Cisco router and the peer must support IPsec.
• The Cisco router and the other peer must run an IOS image that supports encryption.
• The router and the peer must not have hardware IPsec encryption.
![Page 57: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/57.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
RC Algorithms
![Page 58: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/58.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 58
Topic 7.3.4:Diffie-Hellman Key Exchange
![Page 59: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/59.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Diffie-Hellman (DH) Algorithm
![Page 60: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/60.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
DH Operation
![Page 61: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/61.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Section 7.4:Public Key Cryptography
Upon completion of the section, you should be able to:
• Explain the differences between symmetric and asymmetric encryptions and their intended applications.
• Explain the functionality of digital signatures.
• Explain the principles of a public key infrastructure (PKI).
![Page 62: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/62.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 62
Topic 7.4.1:Symmetric Versus Asymmetric Encryption
![Page 63: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/63.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Asymmetric Key Algorithms
Four protocols that use asymmetric key algorithms:
• Internet Key Exchange (IKE)
• Secure Socket Layer (SSL)
• Secure Shell (SSH)
• Pretty Good Privacy (PGP)
![Page 64: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/64.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Public Key + Private Key = Confidentiality
![Page 65: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/65.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Private Key + Public Key = Authenticity
![Page 66: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/66.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Asymmetric AlgorithmsPlease use all 4Figs from this page with the Graphic titles as they tell a story. It may require 2 slides.
Alice Encrypts Message Using Bob’s Public Key
Alice Encrypts A Hash Using Bob’s Public Key
![Page 67: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/67.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Asymmetric AlgorithmsBob Uses Alice’s Public Key to Decrypt Hash
Bob Uses His Public Key to Decrypt Message
![Page 68: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/68.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Types of Asymmetric Algorithms
![Page 69: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/69.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 69
Topic 7.4.2:Digital Signatures
![Page 70: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/70.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Using Digital Signatures
Digital Signature Properties:
• Signature is authentic
• Signature is unalterable
• Signature is not reusable
• Signature cannot be repudiated
![Page 71: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/71.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Code Signing
Digitally signing code provides several assurances about the code:
• The code is authentic and is actually sourced by the publisher.
• The code has not been modified since it left the software publisher.
• The publisher undeniably published the code.
![Page 72: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/72.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Digital Certificates
![Page 73: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/73.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Using Digital Certificates
Sending a Digital Certificate
Receiving a Digital Certificate
![Page 74: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/74.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Digital Signature Algorithms
DSA Scorecard
RSA Scorecard
![Page 75: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/75.jpg)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 75
Topic 7.4.3:Public Key Infrastructure
![Page 76: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/76.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Public Key Infrastructure Overview
![Page 77: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/77.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
PKI Framework
PKI Example
Elements of the PKI Framework
![Page 78: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/78.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Certificate Authorities
![Page 79: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/79.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Interoperability of Different PKI Vendors
![Page 80: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/80.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Public-Key Cryptography Standards
![Page 81: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/81.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Simple Certificate Enrollment Protocol
![Page 82: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/82.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
PKI Topologies
Hierarchical CA
Cross Certified CA
Single-Root PKI Topology
![Page 83: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/83.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Registration Authority
![Page 84: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/84.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Digital Certificates and CAs
Retrieving CA Certificates
Submitting Certificate Requests to the CA
![Page 85: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/85.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Digital Certificates and CAs
Peers Authenticate Each Other
![Page 86: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/86.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Section 7.5:Summary
Chapter Objectives:
• Explain the areas of cryptology.
• Explain to two kinds of encryption algorithms.
![Page 87: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/87.jpg)
Thank you.
![Page 88: CCNA Security v2.0 Chapter 7: Cryptographic Systems](https://reader036.vdocuments.net/reader036/viewer/2022081415/56649f155503460f94c2a07b/html5/thumbnails/88.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Instructor Resources
• Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com)
• These resources cover a variety of topics including navigation, assessments, and assignments.
• A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes.
1
2