CYBR2.TestOut 7.1.7(SY0-601) (13)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Galois Counter Mode (GCM)

All other modes of operation are unauthenticated forms of encryption. The Galois Counter Mode provides both encryption and authentication. GCM works just like Counter Mode except the ciphertext is combined with a special hash. The output of the ciphertext and hash contains the encrypted data along with a Message Authentication Code (MAC) that gives assurance the message has not been tampered with. Because GCM is extremely efficient and provides authentication, it is often used with network communications such as 802.11 and when sending encrypted data to a web server using TLS or SSH. There are other encryption methods that also provide authentication, but GCM is the most widely used method.

Homomorphic Encryption

An inherent risk with all encryption is that for the data to be worked on (computation on ciphertexts), it must first be decrypted. Homomorphic encryption addresses this concern by allowing data to be worked on without decrypting it first. There are three types of homomorphic encryption. To explain the differences, it works best to think of data as integers and to use math functions to represent the manipulation of that data.

Cipher Block Chaining (CBC)

CBC is similar to ECB except this mode uses an initialization vector (IV). The IV is a starting variable that is XORed with the plaintext of the current block to encrypt the data. The IV for the starting block is a randomly generated value. Each subsequent IV is the ciphertext from the previous block. CBC is more secure than ECB due to the IV, but it is slower because blocks cannot be encrypted simultaneously.

Cipher Feedback Mode (CFB)

CFB also uses an IV, but instead of using it on the plaintext, the IV is encrypted first. That output is then XORed with the plaintext to create the block of ciphertext. This is the equivalent of using a one-time pad to encrypt the data. The IV for the starting block is a randomly generated value. Each subsequent IV is the ciphertext from the previous block.

Electronic Code Book (ECB)

ECB is the simplest mode of operation. Each block of plaintext data is encrypted separately. Blocks of data can be encrypted simultaneously allowing for faster encryption. The biggest disadvantage is that blocks with identical data will generate the same ciphertext.

Lightweight Cryptography

In 2018, NIST began the process to standardize encryption algorithms called lightweight cryptography. Lightweight cryptography is meant to be used on Internet of Things (IoT) devices. Many IoT devices are small, low-powered devices that don't have the resources to handle other encryption methods. Some of the limitations of IoT devices that lightweight cryptography needs to address are: Small amount of RAM. Low CPU power. Low powered or runs on batteries. Lightweight cryptography algorithms need to work on these devices efficiently while still providing high levels of security.

Counter Mode (CTR)

Instead of using an initialization vector, CTR uses a nonce combined with a counter that is encrypted. A nonce is a random string that is used for all blocks during the encryption process. The encrypted output of the nonce and counter is then XORed with the plaintext to create the ciphertext. The counter increments for each block. This ensures that each block uses a different value so that even if blocks have the same data, the ciphertext will be different.

Block Cipher

Many symmetric encryption algorithms use the block cipher method. Instead of encrypting our data one bit at a time, a block cipher encrypts the data one chunk at a time. Common block sizes are 64, 128, or 256 bits in length. For example, when encrypting a piece of data that is 100 bytes in size using a 256-bit block size, the data would be encrypted 32 bytes at a time (256 bits/8 = 32 bytes). Because the last block is less than 32 bytes, extra random bits are added to bring the block up to 32 bytes.

Partially Homomorphic Encryption (PHE)

PHE allows only select simple math functions (such as addition) to be performed. This means that only one math function can be performed an unlimited number of times on the encrypted values.

Somewhat Homomorphic Encryption (SHE)

SHE allows more complex math (such as multiplication) to occur. But it can only be performed a limited number of times.

Fully Homomorphic Encryption (FHE)

This method can handle both simple and advanced math functions (such as addition and multiplication) being performed an unlimited number of times on the encrypted values. FHE is still in the developmental stage.

Output Feedback Mode (OFB)

This mode is identical to CFB except for the IV used after the first round. The output of the IV encryption is used as the next block's ciphertext.

Stream Cipher

a symmetric encryption method that encrypts data one bit at a time. The stream cipher is based on the one-time pad (OTP) concept, which was used extensively during World War 2. Consider the following OTP characteristics: The OTP uses a symmetric encryption key that is the same length as the data being encrypted. The encryption key is used to encrypt the data using a process called XORing. This means that two binary strings are compared. If the bits match, a 0 is generated. If the bits don't match, a 1 is generated. The output of the XOR process is the ciphertext. The OTP demonstrates what is called perfect secrecy. This means that it is just as, if not more, difficult for a hacker to brute-force the key as it would be to brute-force the data itself. The OTP only provides perfect secrecy if the secret key is only used once. If used more than once, a hacker could begin to decode it. OTP works well when dealing with small messages, but it becomes impractical when dealing with large data due to the keys being so extensive. A stream cipher solves the problem of having excessively large keys associated with OTP by using a smaller, fixed-length seed key such as one that is 2048 bits in length. The following describes the process of creating a seed key: The seed key is run through a pseudorandom number generator which outputs a new and unique encryption key that is the same size as the data being encrypted. This new key is called a keystream. The keystream is XORed with the data to create the ciphertext. The seed key can be used repeatedly throughout the encryption process. While stream ciphers are less secure than the one-time pad, this method can actually be used in real time. One of the most widely used stream ciphers was Rivest's Cipher 4 (RC4). However, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is no longer used today.


Kaugnay na mga set ng pag-aaral

Mountains: Surviving On Mount Everest

View Set

Psychology Chapters 1-3 Practice quizes

View Set

Chem 1307 Midterm 1—Final Study Guide

View Set