9781111640125_IM_ch11

# Security+ Guide to Network Security Fundamentals

• No School
• NONE 0
• Notes
• 12

This preview shows page 6 - 9 out of 12 pages.

14. Explain that Triple Data Encryption Standard (3DES) was designed to replace DES. It uses three rounds of encryption instead of just one. Use Figure 11-11 to illustrate your explanation. 15. Explain that the Advanced Encryption Standard (AES) was approved by the NIST in late 2000 as a replacement for DES. 16. AES performs three steps on every block (128 bits) of plaintext. Within Step 2, multiple rounds are performed depending upon the key size. Within each round, bytes are substituted and rearranged, and then special multiplication is performed based on the new arrangement. Other Algorithms 1. Describe the following additional symmetric encryption algorithms: a. Rivest Cipher (RC) family from RC1 to RC6 b. International Data Encryption Algorithm (IDEA) c. Blowfish d. Twofish Teaching Tip Vincent Rijmen, one of the co-creators of AES, is also one of the designers of Whirlpool.

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 11-7 Asymmetric Cryptographic Algorithms 1. Explain that asymmetric cryptographic algorithms, also known as public key cryptography, use two keys instead of one. The public key is known to everyone and can be freely distributed, while the private key is known only to the recipient of the message. Use Figure 11-12 to illustrate your explanation. 2. Mention that asymmetric cryptography can also be used to create a digital signature. A digital signature can: a. Verify the sender b. Prevent the sender from disowning the message c. Prove the integrity of the message 3. Use Figure 11-13 to describe the steps for creating a digital signature. 4. Use Table 11-4 to explain various asymmetric cryptography practices. 5. Use Table 11-5 to show the information protections offered by asymmetric cryptography. 6. Define RSA as the most common asymmetric cryptography algorithm. 7. Explain how RSA works. 8. Explain that elliptic curve cryptography uses elliptic curves. An elliptic curve is a function drawn on an X-Y axis as a gently curved line. By adding the values of two points on the curve, you can arrive at a third point on the curve. 9. Mention that the public aspect of an elliptic curve cryptosystem is that users share an elliptic curve and one point on the curve. 10. Discuss quantum cryptography attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping. 11. Describe NTRUEncrypt, which is a relatively new asymmetric cryptographic algorithm that uses a different foundation than prime numbers (RSA) or points on a curve(ECC). Teaching Tip Using a digital signature does not encrypt the message itself. If Bob wants to ensure the privacy of the message, he must also encrypt it using Alice’s public key.
Security+ Guide to Network Security Fundamentals, Fourth Edition 11-8 Using Cryptography 1. Mention that cryptography should be used to secure any and all data that needs to be protected including individual files or databases that are stored on standard desktop computers, servers, removable media, or mobile devices.

Subscribe to view the full document.

You've reached the end of this preview.
• '
• NoProfessor
• Cryptography, Network Security Fundamentals

{[ snackBarMessage ]}

### What students are saying

• As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

Kiran Temple University Fox School of Business ‘17, Course Hero Intern

• I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

Dana University of Pennsylvania ‘17, Course Hero Intern

• The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

Jill Tulane University ‘16, Course Hero Intern