Cryptography Notes

Cryptology

Cryptology
Cryptology

Encryption

Symmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption

Modes of Operation

There are various modes of operation designed to apply the cryptographic algorithm (especially block cipher) to enhance confidentiality, e.g., Cipher block chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR), etc.

Please refer to CISSP PRACTICE QUESTIONS – 20220103 for more.

Cipher block chaining (Source: Wikipedia)

Standard Overview of AES algorithm

In the AES Proposal: Rijndael, it reads:

In most ciphers, the round transformation has the Feistel Structure. In this structure typically part of the bits of the intermediate State are simply transposed unchanged to another position. The round transformation of Rijndael does not have the Feistel structure. Instead, the round transformation is composed of three distinct invertible uniform transformations, called layers. By “uniform”, we mean that every bit of the State is treated in a similar way.

Please refer to CISSP PRACTICE QUESTIONS – 20211112 for more.

Standard overview of AES algorithm
Standard overview of AES algorithm (Credit: UmerFarooq et al.)

Key Generation and Entropy

It’s common that symmetric ciphers nowadays typically employ a secret key with a length between 128 and 256 bits. Block ciphers use fixed-length keys, while stream ciphers use a fix-length key to generate a keystream that works like a conveyor belt and looks unlimited.

Entropy is a measure of the disorder, randomness, or variability in a closed system. An entropy value is between 0 and 1. The higher an entropy value is, the more unpredictable a key generator is.

Please refer to CISSP PRACTICE QUESTIONS – 20220119 for more.

NIST Recommendation for Key Management
NIST Recommendation for Key Management (Source: keylengt)
Keystream as Conveyor Belt
Keystream as Conveyor Belt
Entropy Source Model
Entropy Source Model (Source: NIST SP 800-90B)

RSA (cryptosystem)

RSA is a public-key cryptosystem, published in 1977 by Ron RivestAdi Shamir, and Leonard Adleman. A public key is generated based on two large prime numbers. Even though the public key is shared publicly, the two large prime numbers shall be kept secret.

The RSA Algorithm
The RSA Algorithm (Image Credit: Shihab A. Shawkat)

Please refer to CISSP PRACTICE QUESTIONS – 20210715 for more.

Public Key Infrastructure (PKI)

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. (Wikipedia)

In cryptography, PKCS stands for “Public Key Cryptography Standards”. These are a group of public-key cryptography standards devised and published by RSA Security LLC, starting in the early 1990s. (Wikipedia)

Please refer to the following links for more:

Public key infrastructure
Public key infrastructure (Credit: Wikipedia)
X.509 Certificate Formats
A Sample X.509 Certificate for the Website, WentzWu.com.
A Sample X.509 Certificate for the Website, WentzWu.com.

Leave a Reply