02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cryptography in Action 61<br />

The terms listed here are critical to understanding all forms of cryptography.<br />

You’ll be seeing them again not only in this chapter but in later chapters<br />

as well.<br />

Next let’s look at the two major types of cryptography: symmetric and asymmetric (aka<br />

public-key cryptography).<br />

Symmetric Cryptography<br />

Symmetric algorithms do some things really well and other things not so well. Modern<br />

symmetric algorithms are great at all of the following:<br />

■ Preserving confidentiality<br />

■ Increasing speed<br />

■ Ensuring simplicity (relatively speaking, of course)<br />

■ Providing authenticity<br />

Symmetric algorithms have their drawbacks in these areas:<br />

■ Key management issues<br />

■ Lack of nonrepudiation features<br />

First let’s focus on the defining characteristic of symmetric encryption algorithms: the<br />

key. All algorithms that fit into the symmetric variety use a single key to both encrypt and<br />

decrypt (hence the name symmetric). This is an easy concept to grasp if you think of a key<br />

used to lock a gym locker as the same key used to unlock it. A symmetric algorithm works<br />

the exactly the same way: the key used to encrypt is the same one used to decrypt.<br />

Common Symmetric Algorithms<br />

There are currently a myriad of symmetric algorithms available to you; a Google search<br />

turns up an endless sea of alphabet soup of algorithms. Let’s look at some common algorithms<br />

in the symmetric category:<br />

Data Encryption Standard (DES) Originally adopted by the U.S. government in 1977, the<br />

DES algorithm is still in use today. DES is a 56-bit key algorithm, but the key is too short to<br />

be used today for any serious security applications.<br />

Triple DES (3DES) This algorithm is an extension of the DES algorithm, which is three<br />

times more powerful than the DES algorithm. The algorithm uses a 168-bit key.<br />

Blowfish Blowfish is an algorithm that was designed to be strong, fast, and simple in its<br />

design. The algorithm uses a 448-bit key and is optimized for use in today’s 32- and 64-bit<br />

processors (which its predecessor DES was not). The algorithm was designed by encryption<br />

expert Bruce Schneier.<br />

International Data Encryption Algorithm (IDEA) Designed in Switzerland and made<br />

available in 1990, this algorithm is seen in applications such as the Pretty Good Privacy<br />

(PGP) system (see the section “Pretty Good Privacy” later in this chapter).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!