Ch09 - Using and Managing Keys - Using and M anaging Keys...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Using and M anaging Keys Using and M anaging Keys Security+ Guide to Network Security Fundamentals Chapter 9: 2 Objectives Explain cryptography strengths and vulnerabilities Define public key infrastructure (PKI ) Manage digital certificates Explore key management 3 Understanding Cryptography Strengths and Vulnerabilities Cryptography is science of scrambling data so it cannot be viewed by unauthorized users, making it secure while being transmitted or stored When the recipient receives encrypted text or another user wants to access stored information, it must be decrypted with the cipher and key to produce the original plaintext 4 Symmetric Cryptography Strengths and Weaknesses I dentical keys are used to both encrypt and decrypt the message Popular symmetric cipher algorithms include Data Encryption Standard, Triple Data Encryption Standard, Advanced Encryption Standard, Rivest Cipher, I nternational Data Encryption Algorithm, and Blowfish Disadvantages of symmetric encryption relate to the difficulties of managing the private key 5 Asymmetric Cryptography Strengths and Vulnerabilities With asymmetric encryption, two keys are used instead of one The private key encrypts the message The public key decrypts the message Can greatly improve cryptography security, convenience, and flexibility Public keys can be distributed freely Users cannot deny they have sent a message if they have previously encrypted the message with their private keys Primary disadvantage is that it is computing- intensive 6 Digital Signatures Asymmetric encryption allows you to use either the public or private key to encrypt a message; the receiver uses the other key to decrypt the message A digital signature helps to prove that: The person sending the message with a public key is who they claim to be The message was not altered I t cannot be denied the message was sent 7 Digital Certificates Digital documents that associate an individual with its specific public key Data structure containing a public key, details about the key owner, and other optional information that is all digitally signed by a trusted third party 8...
View Full Document

Page1 / 31

Ch09 - Using and Managing Keys - Using and M anaging Keys...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online