Lesson 3
Lesson 3: Cryptographic Solutions
Encryption Standards
Symmetric Encryption
Same key for encryption/decryption, fast but insecure key distribution
Algorithms:
AES (256-bit): Gold standard for bulk encryption3DES (168-bit): Legacy, being phased outBlowfish/Twofish: Older alternatives
Modes: CBC, GCM (with authentication)
Asymmetric Encryption
Key pairs (public/private), slow, used for small data like key exchange
Algorithms:
RSA (2048-bit+): Key exchange/digital signaturesECC (256-bit+): Efficient for mobile devicesDiffie-Hellman: Key exchange only (IKE)
Hashing
One-way function (no decryption), used for password storage and integrity checks
Algorithms:
SHA-256/512: Current standardMD5 (128-bit): Broken, checksums only
Key Concepts
Weak Keys: Easy to guess, short, not randomStrong Keys: Long and random, resist brute-forceKey Stretching: Make weak keys stronger (PBKDF2, bcrypt, scrypt)Key Exchange: Secure sharing of keys (Diffie-Hellman)Ephemeral Keys: Temporary keys for one session (ECDHE)Perfect Forward Secrecy (PFS): Uses ephemeral keys to protect past sessions
Encryption vs Digital Signatures
Encryption (Confidentiality):
- Alice encrypts with Bob's
public key - Bob decrypts with his
private key
Digital Signature (Integrity + Authenticity):
- Alice signs hash with her
private key - Bob verifies with Alice's
public key
PKI & Certificates
PKI (Public Key Infrastructure): Framework of CAs, certificates, software, services
X.509 Certificate Components:
- Subject (CN, SAN)
- Issuer (CA)
- Validity dates
- Key Usage (Digital Signature, Key Encipherment)
Formats: .pem (Base64), .der (Binary), .pfx/.p12 (with private key)
Certificate Authorities:
Hierarchy: Root CA → Intermediate CA → Leaf certificates
Trust Models:
- Public CA (DigiCert, Let's Encrypt)
- Private CA (Enterprise PKI)
- Self-signed (no chain of trust)
Revocation Methods:
OCSP (Online Certificate Status Protocol): Real-time validation with CACRL (Certificate Revocation List): List of revoked certificatesCSR (Certificate Signing Request): Request sent to CA for certificate- CA: Entity that issues and manages certificates
Key Management
Key Lifecycle:
Generation → Distribution → Storage → Rotation → Destruction
Secure Storage:
HSM (Hardware Security Module): Tamper-proof hardware, supports key escrowTPM (Trusted Platform Module): On-board crypto processor for device keysSecure Enclave: Isolated CPU area (Apple Secure Enclave)
Key escrow: Storing encryption keys securely for recovery (FDE)
Key Exchange Protocols:
KMIP: Standard for centralized key managementPKCS#7/#12: Formats for key/cert transfer
Advanced Concepts
Perfect Forward Secrecy (PFS):
- Ephemeral keys for each session
- Prevents mass decryption if long-term key compromised
- Used in TLS 1.3
Blockchain:
Decentralized ledger with cryptographic hashing, immutable records
Obfuscation Techniques:
Steganography: Hiding data in images (LSB method)Tokenization: Replacing sensitive data with tokens (PCI DSS)Data Masking: Redacting PII in databases
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources