To Contact Me

Phone: 07768 113497

Fax: 01473 423491


CISSP Domain 5 : CRYPTOGRAPHY

Home Page | Network Penetration Testing | Firewall and VPN Engineering | Network Design | Security Policy | Network Support | Employment / Contract History | CV and References | Personal

.Overview

The Cryptography domain addresses the principles, means, and methods of

disguising information to ensure its integrity, confidentiality, and authenticity.

The candidate will be expected to know basic concepts within cryptography;

public and private key algorithms in terms of their applications and uses;

algorithm construction, key distribution and management, and methods of

attack; and the applications, construction and use of digital signatures to

provide authenticity of electronic transactions, and nonrepudiation of the

parties involved.

Key Areas of Knowledge

§ Use of Cryptography to achieve

§  Confidentiality

§  Integrity

§  Authentication

§  Non-repudiation

§ Cryptographic Concepts, Methodologies, and Practices

§  Symmetric Algorithms

§  Asymmetric Algorithms

§  Message Authentication

§  Digital Signatures

§  Non-Repudiation

§  Encryption/Decryption

§  Basic functionality of cryptographic algorithms including DES, RSA,

SHA, MD5, HMAC, and DSA

§  Strengths and weaknesses of cryptographic algorithms and effects of

key length

§  Basic functions involved in key management, including creation,

distribution, verification, revocation, destruction, storage, recovery

and life span and how these functions effect cryptographic integrity

§  Key Distribution Methods and Algorithms including manual, Kerberos,

and ISAKMP

§  Error Detecting/Correcting Features

§  Hash Functions

§  Message Digests including MD5, SHA, and HMAC

§  One-Time Cipher Keys (Pads)

§  Stream Ciphers and Block Ciphers

§  Key Escrow and Key Recovery

§ Private Key Algorithms

§  Applications and Uses

§  Algorithm Methodology

§  Key Distribution and Management

§  Key Generation/Distribution

§  Key Recovery

§  Key Storage and Destruction

§  Key Strength

§  Complexity

§  Secrecy

§  Weak Keys

§ Public Key Algorithms

§  Applications and Uses

§  Algorithm Methodology

§  Key Distribution and Management

§  Key Generation

§  Key Recovery

§  Key Storage and Destruction

§  Key Strength

§  Complexity

§  Secrecy

§  Weak Keys

§ Public Key Infrastructure (PKI)

§  Certificate Authorities

§  Components

§  Hierarchical Structure

§  Certificates

§  Types and Classes

§  How certificates are issued, verified, distributed, and revoked

§  Hierarchy Chain

§ System Architecture for Implementing Cryptographic Functions

§  Use of application and network-based protocols including PEM,

S/MIME, SSL, HTTPS (also known as SHTTP), SET, IPSEC

§  Application of hardware components such as smart cards and tokens

§  Application of cryptographic components such as IPSEC

nodes/ISAKMP


§ Methods of Attack

§  COA

§  KPA

§  CTA including CPA, ACPA, and CCA

§  Brute Force

§  CRACK

§  Replay

§  MIM

§  Birthday

Click to email me