Cipher Text - uIIXiWX2uowfJwaJV+IBU7bVO5oG6n7ez2VdrpkXrCA=
Elliptic curve
Smaller key sizes
Stronger Keys in smaller sizes
ECC 256 is as strong as thousands of times stronger than a RSA key
Weak/deprecated algorithms
Key exchange
Mention Diffie-Hellman
Will be demonstrated in PFS below
Digital signatures
See Diagram
Diffusion
A principle in en encryption where a modification of a single bit of plaintext should modify a large number of bits in the ciphertext(goal is about 50%).
Confusion
Seeks to make the relationship between the key and the ciphertext as complex and involved as much as possible.
Collision
Steganography
Steganography lets you send messages without raising suspicion, but runs the risk of being discovered
Encryption lets you conceal the message but not the fact that the message exists
Obfuscation
Code obfuscation makes it harder to reverse engineer, if a company is worried about that
If you obfuscate the licensing process of the software it makes is more difficult to reverse engineer that process
Stream vs. block
Review
Key strength
Session keys
SSL/TLS
Mentioned in PFS below
Ephemeral key
A cryptographic key that is generated for each execution of a key establishment process
A unique key every time a key is established
Ephemeral is lasting a short time, short lifecycle, short lived
Secret algorithm
Data-in-transit
Data that is traversing a network
Data that is in a buffer waiting to be transmitted/processed
Data that is in system memory waiting to be processed
Data is protected with ACLs, encryption and hashing
Data-at-rest
Data stored on a device or storage media
Data that is not being used by applications
Data that is not being transfer over network medium
Examples
Backups
Offsite Backups
External media
Data is proteced with encryption, hashing and ACLs
Data-in-use
Data that is actively being processed by applications
Data that is being viewed and/or modified by a user
Data is protected with ACLs
Random/pseudo-random number generation
TRNG
TRNG produces a random string based on a physical process like static in airwaves, ocean waves, thermal noise
PRNG
PRNG produce a random string of numbers via a mathematical algorithm
Not truly random, however when the number string is compared to a truly random string it APPEARs random