Page 543 - StudyBook.pdf
P. 543

Basis of Cryptography • Chapter 9  527

                 refers to the processing power and time required to encrypt and decrypt a message,
                 and ease of implementation refers to an algorithm’s predisposition (if any) to hardware
                 or software usage. Each algorithm has different strengths and drawbacks, and none
                 of them are ideal in every way.There are many questions about the number of dif-
                 ferent cryptographic algorithms on the Security+ exam.This section discusses the
                 key algorithms, which fall into three main categories:

                      ■  Symmetric cryptography

                      ■  Asymmetric cryptography
                      ■  Hashing algorithms




                 TEST DAY TIP
                      All of the algorithms presented in this chapter are open algorithms,
                      which means that the internals of the algorithms, while they may or
                      may not be covered by patents, are open for examination by the public.
                      In contrast, proprietary algorithms keep the internal workings secret
                      and are slightly harder to crack at their initial release. Open standards
                      algorithms are usually the most secure. Proprietary algorithms are also
                      based on security through obscurity, but that obscurity has prevented
                      public examination that could discover undiscovered flaws.




                 What Is Encryption?


                 Encryption is a form of cryptography that “scrambles” plaintext into unintelligible
                 ciphertext. Encryption is the foundation of such security measures as digital signa-
                 tures, digital certificates, and the Public Key Infrastructure (PKI) that uses these
                 technologies to make computer transactions more secure. Computer-based encryp-
                 tion techniques use keys to encrypt and decrypt data.A key is a variable (sometimes
                 represented as a password) that is a large binary number—the larger, the better. Key
                 length is measured in bits, and the more bits in a key, the more difficult the key will
                 be to “crack.” For example, a 40-bit key is considered insecure by today’s standards,
                 but it can have a value between 1 and 2^140 (1,099,511,627,776, over a trillion).
                    The key is only one component in the encryption process. It must be used in
                 conjunction with an encryption algorithm (a process or calculation) to produce the
                 ciphertext. Encryption methods are usually categorized as either symmetric or



                                                                              www.syngress.com
   538   539   540   541   542   543   544   545   546   547   548