Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography - Coggle Diagram
Cryptography
What is Cryptography?
Unencrypted information
plaintext
Encrypted information
ciphertext
Symmetric
uses same key for encryption and decryption
Asymmetric
uses a different key for encryption and decryption
Four main goals
confidentiality, integrity, authentication, and nonrepudiation
Four types of attacks
known-plaintext attack
chosen-plaintext attack
ciphertext only attack
chosen-cipher attack
Business and Security Requirements for Cryptography
internal security
confidentiality, privacy, integrity, authorization, and access control
security in business relationships
message authentication, signature, receipt and confirmation, and nonrepudiation
security measures that benefit anyone
anonymity, timestamping, revocation, ownership, high resiliency, and supporting obfuscation
Types of Ciphers
transposition
moves characters around
substitution
replaces characters
Cryptographic Principles, Concepts, and Terminology
Security Implementations for Businesses
authentication, access control/authorization, assessment and audit, security management protocols, perimeter/network security/availability, content filtering, encryption, administration/education, outsource services/consultants
Hash functions
used to make sure messages were not tampered with/damaged and/or changed in transmission
Digital signatures
used with hash functions and a private key to validate the authentication of who sent a message
Symmetric Key Standards
data encryption standard, triple DES, international data encryption algorithm, CAST, blowfish, advanced encryption standard, RC2, and RC4
Modern Key Management Techniques
AES, IPSec, ISAKMP, XKMS, Managed PKI, ANSI X9. 17,