Page 259 - CISSO_Prep_ Guide
P. 259

▪  El Gamal – like RSA but
                                     unpatented.
                                 ▪  LUC.
                          •  Others
                                 ▪  Merkle-Hellman Knapsack
                                     (broken).
                                 ▪  Chor-Rivest knapsack (broken).

               Hybrid Systems – PGP, S/MIME, VPN/SSL. Hybrid
               systems use symmetric for bulk data encryption
               and asymmetric for key distribution.


               Message Integrity Controls
                       •  Accidental change detection is done
                          through parity, hashing, and checksums.
                       •  Intentional change detection is done
                          through digital signature, HMAC, and
                          CBC-MAC.
                              •  CBC-MAC
                                 ▪  Hash the ciphertext
                                 ▪  Encrypt the ciphertext using
                                     Cipher Block Chaining (CBC).
                                 ▪  Take the last encrypted hash
                                     block and encrypt it again.
                                         •  Note: WPA2 the
                                            message is considered a
                                            “frame,” not a block
                                 ▪  That value becomes the
                                     message authentication code
   254   255   256   257   258   259   260   261   262   263   264