Wednesday, July 19, 2017

Encryption Methods



Data Protection

Algorithm
Strength
Use
DES
Insecure
Government used in the 1970’s
AES
Secure
Replaced DES and is currently used by the government.
AES256
Extremely Secure
Government uses this for top secret information.

Algorithm
Strength
Use
RSA
Secure
Multiple environments, such as SSL and key exchange.
Diffie-Hellman
Secure
Creates and sends keys across public networks (Dulaney & Easttom, 2014).
Elliptic Curve Cryptography
Most Secure
Combines points within a curve with points at infinity.

Hashing must contain these three characteristics, irreversible, fixed length, and no collisions.  There are also three hashing algorithms available, Secure Hash Algorithm (SHA), Message Digest Algorithm (MD), and RACE Integrity Primitives Evaluation Message Digest Algorithm (RIPEMD).
Secure Hash Algorithm has three different size values, SHA which is a 160-bit hash value, SHA-2 which has 224, 256, 334, and 512-bit, and SHA-3 which uses the SHA-2 values.  SHA can be utilized alongside of an encryption protocol.  SHA-2 is the most commonly used worldwide, but SHA3 was recently released and has now become a standard.  The original name for SHA was Keccak and it was designed by Guideo Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche. (Dulaney & Easttom, 2014)
The Message Digest Algorithm, which creates an one-way hash that helps maintain integrity.  The most recently released version is MD5 which has a 128-bit hash.  The others before it, MD, MD2, and MD4 are far less complex and unsecure.  Although MD5 is secure it does not have a very strong collision resistance.  Therefore, this algorithm is not recommended as SHA is the alternative.
RACE Integrity Primitives Evaluation Message Digest Algorithm, was originally based off of MD4, which brought questions of its security.  Currently there are still other versions of RIPEMD, which are RIPEMD-160, RIPEMD-256, and RIPEMD-320.  Overall, the most secure hashing algorithm to this day seems to be SHA3.
Secure Sockets Layer (SSL) is a protocol that utilizes the handshake method of starting a session.  SSL is a standard security technology that creates an encrypted connection between a web server and a web browser.  The connection guarantees that all data distributed between the two parties remain secretive and integral.  This protocol can be used alongside with Transport Layer Security (TLS). 
Transport Layer Security (TLS) is the security protocol that would expand upon utilizing alongside SSL.  A majority of web browsers start with port 443 when accessing a TLS/SSL connection, unless the server is configured to use port 80.  The reason of which TLS is the better option than SSL, as it is more secure and does not require nearly as much configuration.
Company
Encryption Used
Basic Cost
Symantec
Combination of SSL encryption and a non-encrypted HTTP ports
$399 for 1 year
Digicert
Combination of SSL encryption and RSA.
$175 for 1 year

Reason
Definition
Example
Confidentiality
Avoid the unsanctioned discovery of data on a network.
An unsecure network with little to no confidentiality is easy to crack and steal the data.
Integrity
Guaranteed that a message wasn’t altered during communication.
Message being altered to contain a virus during transmission.
Digital Signatures
Authenticates the veracity of the memo and source.
Like a signature used when processing a transaction.
Authentication
Verification of authenticity.
Not a fake.
Nonrepudiation
Denial prevention
Preventive measures to ensure denial is not possible.

Public Key Infrastructure system (PKI) is a system that helps create and preserve a dependable networking environment.  Its main purpose is specifically to manage certificates and keys.  The use of PKI enables the organization the ability to utilize encryption and digital signature services across a wide variety of applications.  Public Key Infrastructure contains four main components, certificate authority (CA), registration authority (RA), RSA, and digital certificates (Dulaney & Easttom, 2014).
Certificate authority, is an association that issues, revokes and distributes certificates for verification purposes.  A registration authority, allows some of the workload from the certificate authority to be distributed as RA is basically the middleman within the entire process.  Registration authority basically handles the distribution, validation, and the registrations for the certificate authority.
RSA is an algorithm that utilizes large integers as the base, being it has been widely implemented it is now a standard.  The digital certificate is used throughout the process to verify the authenticity of all parties involved.

No comments:

Post a Comment

Binary Conversions

The conversion of numbers is common in mathematics and has been used for many generations.   During the creation of computers number co...