View on GitHub

presentations

Presentation notes from JMU Unix Users Group meetings

Information Security

UUG Spring 2023


“The three golden rules to ensure computer security are: do not own a computer; do not power it on; and do not use it.” — Robert Morris


CIA Triad


Confidentiality


Integrity


Availability


Which Aspect of the CIA Triad is Most Important?


Additional CIA Triad Concepts


Cryptography Concepts


Kerckhoffs’s principle


Types of Ciphers


Electronic Codebook (ECB)

bg vertical right:55% width:750px

bg right:55% width:750px

width:400px


Cipher Block Chaining (CBC)

bg vertical right:60% width:750px

bg  right:60% width:750px


Output feedback (OFB)

bg vertical right:60% width:750px

bg right:60% width:750px


Types of Encryption

Symmetric Asymmetric
Single key Two linked/related keys
Fast Slow
Good for large data transfers Good for small data transfers
Only provides confidentiality Can provide confidentiality, authentication, and non-repudiation

Symmetric Encryption

width:1000px Basic image of symmetric key encryption


“Perfect” Encryption - One-Time Pad (OTP)


One-Time Pad Encryption

width:1175px


One-Time Pad Decryption

width:1175px


Is One-Time Pad practical to implement?


Feistel Cipher


How the Feistel Cipher Works

width:400px


Data Encryption Standard


How the Data Encryption Standard Works

bg right width:600px


Triple DES (3DES)

bg left:55% width:675px


Advanced Encryption Standard (AES)

  Key length (bits) Block size (bits) # of Rounds
AES-128 128 128 10
AES-192 192 128 12
AES-256 256 128 14

How AES works (1 of 2)

width:800px


How AES works (2 of 2)

bg right:55% width:550px


How AES works - SubBytes

bg left width:500px

width:550px


How AES works - ShiftRows

width:1000px


How AES works - MixColumns

width:750px


How AES works - AddRoundKey

width:700px


Asymmetric Encryption

Basic image of asymmetric key encryption


Diffie Hellman key exchange (DH)

bg right width:450px


How DH Works (1 of 2)

Alice Bob
α = 4 β = 3
A = gᵃ mod p B = gᵇ mod p
A = 5⁴ mod 23 = 625 mod 23 = 4 B = 5³ mod 23 = 125 mod 23 = 10
sᵃ = Bᵃ mod p sᵇ = Aᵇ mod p
sᵃ = 10⁴ mod 23 = 10000 mod 23 = 18 sᵇ = 4³ mod 23 = 64 mod 23 = 18

How DH Works (2 of 2)

width:


Rivest-Shamir-Adleman (RSA)


How RSA Works (1 of 2)


How RSA Works (2 of 2)

bg right width:600px


RSA Example (1 of 3)


RSA Example (2 of 3)


RSA Example (3 of 3)


Elliptic-Curve Cryptography (ECC)


How ECC Works (1 of 4)

bg right:40% width:500px


How ECC Works (2 of 4)

Alice Bob
α = 3 β = 9
Α = 3G Β = 9G

bg left width:600px


How ECC Works (3 of 4)

bg left width:600px


How ECC Works (4 of 4)

Alice Bob
Α = 3G = (10,6) Β = 9G = (7,6)
αΒ = 3Β = 3(9G) = 27G = 8G = (13,7) βΑ = 9Α = 9(3G) = 27G = 8G = (13,7)

width:500px


Comparison of Symmetric and Asymmetric Algorithms

Security Bits Symmetric Encryption Algorithm RSA ECC
80   1024 160
112 3DES 2048 224
128 AES-128 3072 256
192 AES-192 7680 384
256 AES-256 15360 512

Symmetric Encryption Quantum Threats


Asymmetric Encryption Quantum Threats


Hashing

Basic image of a cryptographic hashing algorithm


Password Hashing


Storing Hashed Passwords - LAN Manager


Storing Hashed Passwords - New Technology LAN Manager


Storing Hashed Passwords - sha512crypt


man 5 crypt - sha512crypt

width:1000px


man 5 crypt - yescrypt

width:1000px


Password Hashing Explained