MODULE 21 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards
Integrity and Authenticity Securing Communications Organizations must provide support to secure the data as it travels across links.
This may include internal traffic, but it is even more important to protect the data that travels outside of the organization to branch sites, telecommuter sites, and partner sites.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Integrity :
Guarantees that the message was not altered. Any changes to data in transit will be detected.
Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Origin Authentication :
Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Confidentiality - :
Guarantees that only authorized users can read the message.
If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
These are the four elements of secure communications:
Data Integrity - Guarantees that the message was not altered.
Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use, however it is inherently insecure and creates vulnerabilities in a network.
The use of MD5 should be avoided. Origin Authentication - Guarantees that the message is not a forgery and does actually come from whom it states.
Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Data Confidentiality - Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time.
Data confidentiality is implemented using symmetric and asymmetric encryption algorithms.
Data Non-Repudiation - Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Nonrepudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Data Non-Repudiation -
Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.
Non-repudiation relies on the fact that only the sender has the unique characteristics or signature for how that message is treated.
Cryptography can be used almost anywhere that there is data communication. In fact, the trend is toward all communication being encrypted.
Cryptographic Hash Functions
Hashes are used to verify and ensure data integrity.
Hashing is based on a one-way mathematical function that is relatively easy to compute, but significantly harder to reverse.
Grinding coffee is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the tiny pieces back together to rebuild the original beans.
The cryptographic hashing function can also be used to verify authentication.
https://snipboard.io/I3FfsM.jpg
Cryptographic Hash Functions Grinding coffee is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the tiny pieces back together to rebuild the original beans.
The cryptographic hashing function can also be used to verify authentication.
https://snipboard.io/I3FfsM.jpg
As shown in the figure,
https://snipboard.io/I3FfsM.jpg a hash function takes a variable block of binary data, called the message, and produces a fixed-length, condensed representation, called the hash.
The resulting hash is also sometimes called the message digest, digest, or digital fingerprint.
Cryptographic Hash Functions
As shown in the figure,
https://snipboard.io/I3FfsM.jpg a hash function takes a variable block of binary data, called the message, and produces a fixed-length, condensed representation, called the hash.
The resulting hash is also sometimes called the message digest, digest, or digital fingerprint.
With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output.
Every time the data is changed or altered, the hash value also changes.
Because of this, cryptographic hash values are often called digital fingerprints.
They can be used to detect duplicate data files, file version changes, and similar applications.
These values are used to guard against an accidental or intentional change to the data, or accidental data corruption.
Cryptographic Hash Functions
With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output.
Every time the data is changed or altered, the hash value also changes.
Because of this, cryptographic hash values are often called digital fingerprints.
They can be used to detect duplicate data files, file version changes, and similar applications. These values are used to guard against an accidental or intentional change to the data, or accidental data corruption.
The cryptographic hash function is applied in many different situations for entity authentication, data integrity, and data authenticity purposes.
Cryptographic Hash Operation Mathematically, the equation h= H(x) is used to explain how a hash algorithm operates.
As shown in the figure, a hash function H takes an input x and returns a fixed-size string hash value h.
https://snipboard.io/tYNFW4.jpg
The example in the figure
https://snipboard.io/tYNFW4.jpg summarizes the mathematical process.
A cryptographic hash function should have the following properties:
The input can be any length. The output has a fixed length. H(x) is relatively easy to compute for any given x.
H(x) is one way and not reversible.
H(x) is collision free, meaning that two different input values will result in different hash values.
If a hash function is hard to invert, it is considered a one-way hash.
Hard to invert means that given a hash value of h, it is computationally infeasible to find an input for x such that h=H(x).
MD5 and SHA Hash functions are used to ensure the integrity of a message.
They ensure data has not changed accidentally or intentionally. In the figure, the sender is sending a $100 money transfer to Alex.
The sender wants to ensure that the message is not accidentally altered on its way to the receiver.
Deliberate changes that are made by a threat actor are still possible.
https://snipboard.io/Mkg3cB.jpg
MD5 and SHA Hash functions are used to ensure the integrity of a message.
They ensure data has not changed accidentally or intentionally. In the figure, the sender is sending a $100 money transfer to Alex.
The sender wants to ensure that the message is not accidentally altered on its way to the receiver.
Deliberate changes that are made by a threat actor are still possible.
https://snipboard.io/Mkg3cB.jpg
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
MD5 with 128-bit digest :
Developed by Ron Rivest and used in a variety of internet applications, MD5 is a one-way function that produces a 128-bit hashed message.
MD5 is considered to be a legacy algorithm and should be avoided and used only when no better alternatives are available.
It is recommended that SHA-2 or SHA-3 be used instead.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-1 :
Developed by the U.S. National Security Agency (NSA) in 1995.
It is very similar to the MD5 hash functions. Several versions exist.
SHA-1 creates a 160-bit hashed message and is slightly slower than MD5.
SHA-1 has known flaws and is a legacy algorithm.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-2 :
Developed by the NSA.
It includes SHA-224 (224 bit),
SHA-256 (256 bit),
SHA-384 (384 bit), and
SHA-512 (512 bit). If you are using SHA-2, then the SHA-256, SHA-384,
and SHA-512 algorithms should be used whenever possible.
There are four well-known hash functions:
MD5 with 128-bit digest SHA-1 SHA-2 SHA-3
SHA-3 :
SHA-3 is the newest hashing algorithm and was introduced by NIST as an alternative and eventual replacement for the SHA-2 family of hashing algorithms.
SHA-3 includes SHA3-224 (224 bit),
SHA3-256 (256 bit),
SHA3-384 (384 bit),
and SHA3-512 (512 bit).
The SHA-3 family are next-generation algorithms and should be used whenever possible.
SHA-3 :
SHA-3 is the newest hashing algorithm and was introduced by NIST as an alternative and eventual replacement for the SHA-2 family of hashing algorithms.
SHA-3 includes SHA3-224 (224 bit),
SHA3-256 (256 bit),
SHA3-384 (384 bit), and
SHA3-512 (512 bit).
The SHA-3 family are next-generation algorithms and should be used whenever possible.
While hashing can be used to detect accidental changes, it cannot be used to guard against deliberate changes that are made by a threat actor.
There is no unique identifying information from the sender in the hashing procedure.
This means that anyone can compute a hash for any data, as long as they have the correct hash function.
While hashing can be used to detect accidental changes, it cannot be used to guard against deliberate changes that are made by a threat actor.
There is no unique identifying information from the sender in the hashing procedure.
This means that anyone can compute a hash for any data, as long as they have the correct hash function.
For example, when the message traverses the network, a potential attacker could intercept the message, change it, recalculate the hash, and append it to the message.
The receiving device will only validate against whatever hash is appended.
Therefore, hashing is vulnerable to man-in-the-middle attacks and does not provide security to transmitted data.
To provide integrity and origin authentication, something more is required.
Origin Authentication To add origin authentication and integrity assurance, use a keyed-hash message authentication code (HMAC).
HMAC uses an additional secret key as input to the hash function.
Note: Other Message Authentication Code (MAC) methods are also used.
However, HMAC is used in many systems including SSL, IPsec, and SSH.
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
HMAC HASHING ALGORITHM :
As shown in the figure, an HMAC is calculated using any cryptographic algorithm that combines a cryptographic hash function with a secret key. Hash functions are the basis of the protection mechanism of HMACs.
Only the sender and the receiver know the secret key, and the output of the hash function now depends on the input data and the secret key.
Only parties who have access to that secret key can compute the digest of an HMAC function.
This defeats man-in-the-middle attacks and provides authentication of the data origin.
If two parties share a secret key and use HMAC functions for authentication, a properly constructed HMAC digest of a message that a party has received indicates that the other party was the originator of the message.
This is because the other party possesses the secret key.
https://snipboard.io/EMQSXa.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
CREATING THE HMAC VALUE:
As shown in the figure, the sending device inputs data (such as Terry Smith’s pay of $100 and the secret key) into the hashing algorithm and calculates the fixed-length HMAC digest.
This authenticated digest is then attached to the message and sent to the receiver.
https://snipboard.io/lPLZDO.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
VERIFYING THE HMAC VALUE :
In the figure, the receiving device removes the digest from the message and uses the plaintext message with its secret key as input into the same hashing function.
If the digest that is calculated by the receiving device is equal to the digest that was sent, the message has not been altered.
Additionally, the origin of the message is authenticated because only the sender possesses a copy of the shared secret key.
The HMAC function has ensured the authenticity of the message.
https://snipboard.io/1yULY4.jpg
– HMAC HASHING ALGORITHM
– CREATING THE HMAC VALUE
– VERIFYING THE HMAC VALUE
– CISCO ROUTER HMAC EXAMPLE
CISCO ROUTER HMAC EXAMPLE :
The figure shows how HMACs are used by Cisco routers that are configured to use Open Shortest Path First (OSPF) routing authentication.
R1 is sending a link state update (LSU) regarding a route to network 10.2.0.0/16: R1 calculates the hash value using the LSU message and the secret key.
The resulting hash value is sent with the LSU to R2. R2 calculates the hash value using the LSU and its secret key.
R2 accepts the update if the hash values match. If they do not match, R2 discards the update.
https://snipboard.io/Loy6am.jpg
Confidentiality Data Confidentiality
There are two classes of encryption used to provide data confidentiality;
asymmetric and symmetric.
These two classes differ in how they use keys.
Symmetric encryption algorithms such as Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are based on the premise that each communicating party knows the pre-shared key.
Data confidentiality can also be ensured using asymmetric algorithms, including Rivest, Shamir, and Adleman (RSA) and the public key infrastructure (PKI).
Symmetric encryption algorithms such as Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are based on the premise that each communicating party knows the pre-shared key.
Data confidentiality can also be ensured using asymmetric algorithms, including Rivest, Shamir, and Adleman (RSA) and the public key infrastructure (PKI).
Note:
DES is a legacy algorithm and should not be used. 3DES should be avoided if possible. The figure highlights some differences between symmetric and asymmetric encryption.
https://snipboard.io/dO0W7S.jpg