Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms

Description

HBO CISSP (ISC)2 Mind Map on Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms, created by Niels de Jonge on 30/01/2018.
Niels de Jonge
Mind Map by Niels de Jonge, updated more than 1 year ago
Niels de Jonge
Created by Niels de Jonge about 6 years ago
54
0

Resource summary

Chapter 6 - CISSP Domain 3 - Cryptographic and Symmetric Algorithms
  1. Historical
    1. Ceaser Cipher
      1. ROT3
        1. 'Rotate 3' = A becomes D, Z Becomes C etc.
          1. Simple crack by Frequency Analysis
        2. American Civil War
          1. Flag signs
            1. Cipherdisks
              1. Codebooks
              2. WW II
                1. Enigma
                  1. Ultra
                    1. Purple Machine
                  2. Crypto Bascis
                    1. Goals of Cryptography
                      1. Confidentiality
                        1. Symmetric
                          1. Shared Secret
                            1. Public key
                          2. A-Symmetric
                            1. consists of a combination of Private & Public Keys
                          3. Integrity
                            1. Safeguard through Digital Signatures
                              1. Protection from unauthorized modification; technique used in MitM
                              2. Authentication
                                1. Enforce challenge Response on shared secret
                                2. Nonrepudiation
                                  1. Provide evidence of sending
                                    1. Protection from masquerading; technique used in MitM
                                    2. Data in Motion
                                      1. Data at Rest
                                      2. Cryptographic Concepts
                                        1. Plaintext + Encryption = Ciphertext
                                          1. Cryptographic Algorithm
                                            1. knows a Key
                                              1. is a Key Space
                                                1. consist of a Bit Size
                                                  1. consist of a Binary code string ( 0 & 1)
                                                  2. is a Range between 0000... and 1111... or 0 to 2^n, where n is the bit size, is a range inside the algorithm a.k.a. the key
                                            2. Cryptology
                                              1. Cryptanalysis
                                                1. Cryptography
                                              2. Cryptographic Mathematics
                                                1. Boolean
                                                  1. True or False ( 1 or 0 ) On or Off
                                                  2. Logical
                                                    1. AND
                                                      1. X^Y
                                                        1. X=1 Y=1 X^Y=1
                                                          1. Annotations:

                                                            • X        110011010 Y        010100011 X^Y .  010000010
                                                        2. Two values both true
                                                        3. OR
                                                          1. X∨Y
                                                            1. X=0 Y=1 X∨Y=1
                                                              1. Annotations:

                                                                • Y       100111100 X .     100110001 X∨Y . 100111101
                                                            2. One of the values is true
                                                            3. NOT
                                                              1. ~ or !
                                                                1. X=0 ~X=1
                                                                  1. Annotations:

                                                                    • X .    11001101010 ~X .  00110010101
                                                                2. Opposites
                                                                3. Exclusive OR / XOR
                                                                    1. X=1 Y=1 X⊕Y=0
                                                                      1. Annotations:

                                                                        • X .       101001110001 Y .       110011100101 X⊕Y .  011010010100
                                                                    2. Only one of the values is true
                                                                  1. Modulo Function (mod)
                                                                    1. mod
                                                                      1. Remainder value left after a possible and ideal division operation
                                                                        1. Annotations:

                                                                          • 4 mod 1 = 0 5 mod 2 = 1 65 mod 92 = 65 6 mod 6 = 0 82 mod 10 = 2 14 mod 5 = 4 64 mod 7 = 1
                                                                      2. One-Way Functions
                                                                        1. Math operation producing values for each possible input combination without possibility of retrieval of input value
                                                                          1. basis for Public key cryptosystems
                                                                          2. Work Function =/= Work Factor
                                                                            1. Time needed to break encryption
                                                                          3. Nonce
                                                                            1. Added randomness to the encryption process
                                                                            2. Zero Proof Knowledge
                                                                              1. Magicdoor principle
                                                                              2. Split knowledge
                                                                                1. Key escrow
                                                                                  1. Segragation of duty by having multiple agents nessecary in order to decrypt
                                                                                  2. Ciphers
                                                                                    1. Hide true meaning / works on charaters and bits
                                                                                      1. Transposition cipher
                                                                                        1. Rearrange the sequence of the characters
                                                                                        2. Substitution cipher
                                                                                          1. Replacement of character by another
                                                                                        3. Codes
                                                                                          1. Codes represent words or phrases / are sometimes public knowledge
                                                                                      2. Modern Cryptography
                                                                                        1. Symmetric Cryptography
                                                                                          1. Cryptographic Lifecycle
                                                                                            Show full summary Hide full summary

                                                                                            Similar

                                                                                            Final Exam 2015+
                                                                                            Alexandre Pinheiro
                                                                                            CISSP Domains
                                                                                            pikeje
                                                                                            Project Mngt Chapter 6
                                                                                            damimgd2u
                                                                                            Chapter 6 Homework
                                                                                            void pickle
                                                                                            Capitulum VI: Pensum C
                                                                                            Anita Thomer
                                                                                            Capitulum VI: Pensum B
                                                                                            Anita Thomer
                                                                                            50. People Are More Motivated As They Get Closer to a Goal
                                                                                            Miranda Davis
                                                                                            MARKETING CH 6: Customer Value-Driven Marketing Strategy: Creating
                                                                                            itachi uchiha
                                                                                            Part 2 - Ch 6: Functionalism: The Normal and the Pathological
                                                                                            missylew69
                                                                                            51. Variable Rewards are powerful
                                                                                            Miranda Davis
                                                                                            Certified Information Systems Security Professional (CISSP)
                                                                                            GoAsk Chaz