Professional Documents
Culture Documents
CISSP Mini MasterClass Workbook
CISSP Mini MasterClass Workbook
CISSP Mini MasterClass Workbook
Contents
Domain 3.......................................................................................................................................................................................................... 4
Class 1 .......................................................................................................................................................................................................... 5
5 Services of Cryptography ..................................................................................................................................................................... 5
Cryptographic Definitions ....................................................................................................................................................................... 5
Encryption / Decryption .......................................................................................................................................................................... 6
Confusion | Diffusion | Avalanche .......................................................................................................................................................... 7
Methods of Encryption ........................................................................................................................................................................... 8
Substitution ............................................................................................................................................................................................. 8
Transposition .......................................................................................................................................................................................... 8
Transposition: Rail Fence (zigzag) Cipher ................................................................................................................................................ 8
Symmetric vs. Asymmetric Cryptography Overview ............................................................................................................................... 9
Symmetric Cryptography ........................................................................................................................................................................ 9
Out-of-band Key Distribution .................................................................................................................................................................. 9
Class 2 ........................................................................................................................................................................................................ 10
Symmetric Cryptography Recap ............................................................................................................................................................ 10
Mathematical MAGIC Key Pair .............................................................................................................................................................. 10
Asymmetric Cryptography .................................................................................................................................................................... 11
Hybrid Cryptography ............................................................................................................................................................................. 11
Hard Math Problems ............................................................................................................................................................................. 12
Hashing Functions ................................................................................................................................................................................. 12
Using Hashing to Verify Integrity .......................................................................................................................................................... 13
Digital Signatures .................................................................................................................................................................................. 13
Class 3 ........................................................................................................................................................................................................ 14
Services Provided by Digital Signatures ................................................................................................................................................ 14
Creating Digital Signatures .................................................................................................................................................................... 14
Using Digital Signatures to Verify Integrity & Authenticity ................................................................................................................... 15
Non-repudiation.................................................................................................................................................................................... 15
Digital Signatures & Man-in-the-middle Attacks................................................................................................................................... 16
Digital Certificates ................................................................................................................................................................................. 16
Complete CISSP MasterClass................................................................................................................................................................. 16
Domain 3
Security Architecture and Engineering
Class 1
5 Services of Cryptography
Cryptographic Definitions
• Art and science of writing secrets
• Accomplished by a cryptosystem
Encryption
Decryption
Crypto variable
Key clustering
Work factor
Nonce
(Initialization
Vector)
Small
Change
BIG
Change
Confusion
Diffusion
Avalanche
Substitution
Transposition
Symmetric Cryptography
Advantages Disadvantages
Encrypt Decrypt
Key Key
Mathematical
MAGIC
Private Key Public Key
Advantages Disadvantages
Hybrid Cryptography
Asymmetric
Alice Bob
Bob’s Public Key Bob’s Private Key
Symmetric
Factoring & Discrete Logs asymmetric algorithms depend on using very large prime
numbers
When using such large numbers, it is very difficult to work backwards to determine
the original integers
Hashing Functions
Lorem Ipsum
Hashing Function
01101010
Alice Bob
42 in the 42 in the
tridecimal tridecimal
H H
numeral numeral
system system
Verify
Digital Signatures
Alice Bob
42 in the H 42 in the H
tridecimal tridecimal
numeral numeral
system system
Verify
Non-repudiation
Non-repudiation
+
Baddies’s Alice’s
Private Key Public Key
Verify
# #
Digital Certificates
Digital Certificate
Name: Alice
Organization: NASA
Country: Canada
Alice’s
Public Key
It is incredibly rewarding to help folks like yourself learn, become better security
professionals, and achieve your CISSP certification!
You’ve gotten a glimpse of our complete CISSP MasterClass that is the easiest way
for you to achieve your CISSP certification.
If you’d like to have a clear study path laid in front of you, check-out all the details,
and enrol in on our CISSP MasterClass here: destcert.com/CISSP
Rob