Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody. And welcome to the I achieve Security episode number 21 Symmetric algorithm. My name is Alejandro Pena, and I'll be instructed for today's session.
00:13
The learning objectives is to understand and be able to identify the main concepts off symmetric algorithms.
00:21
Well, we have again Bob and Alice here. They went well. Book Buck. When fra.
00:27
So a tan salon. So done, Josh Him.
00:31
So we have above here.
00:34
And I was here,
00:37
um,
00:39
asymmetric algorithms.
00:42
Well, she met Valerie was algorithms uses one key on Lee between the two parties or whatever quantity off people there is. So the same key, you know,
00:53
two.
00:55
Will you sit here and hear Now the main The main problem with this is how can we get the key from here from Bob to do Wallace?
01:07
How can you know? How can we transfer the key safely if you know that right here.
01:17
There we have the injury.
01:19
The cloud,
01:22
um you know,
01:25
how can we be sure that the key whenever we transfer here wasn't intercepted here or here or here or in the number of hope hopes this, um, you know, jump
01:38
this packet jumped. Uh, how can we know that it wasn't modifying. How can we know if it was stolen for someone? Because at the end, if there's a delicious guy
01:51
over here,
01:53
No, he's angry
01:55
for some reason.
01:57
Um,
01:57
hey, stole the key.
02:00
So any communication between Bob and Alleys will be, you know,
02:07
decrypted by this guy because they he has the key. And, you know, there's a problem there talking. We make sure that we can raise this guy
02:16
and it doesn't exist anymore.
02:19
Uh, well,
02:21
there's a problem that can be solved, and we'll see that with asymmetric case. But for now, this is the main problem. We can use our band,
02:31
um,
02:36
communications.
02:38
We can send the key over a news, be or we can send the key, you know, printed in a letter. I don't know any outer band communication that can work for us. It will be fine. The point is that this case should be only by buff and by Ali's. That's it.
02:58
Okay, having said that, this this is one of the disadvantages of using cimento kiss. The other disadvantage of using symmetric kiss is that we have to use a lot of kiss The formula to calculate how many keys we need is this one
03:16
and
03:19
I don't reply by an mines one
03:22
all of this divided by two.
03:23
Now, the problem is that
03:27
it is all good. You know, when we have only two people because we need to kiss right here. When I say to kiss, I mean the same keeper shirt between this person. Right? So this is even though it is the same key we needed at this side above side and analysis eyes.
03:44
Um, So what? What will happen if we have a business with
03:49
50 employees? S o old man will have to replace the formula and use it
03:55
50 by 50 miners long to be 49 divided but to and the result for this is a 1000
04:06
225.
04:11
When you see the 225
04:14
we need 1225 cases
04:17
symmetric case. In order for this, 50 boys can communicate with encryption. So this is a This is an issue for us because at the end, the more employees the monkeys we need, this becomes unmanageable. If we have 100
04:33
employees and can you imagine 1000 boys. This will be a you know, a headache for Franny Syst system administrator.
04:43
These are two main decent badges off using symmetric case. But you know, it is all the lust. What what's one of the advantages of using is that they are really fast. This symmetric hey Kiss has better
05:02
performance
05:06
than the a C. Merrick asymmetric kiss. This'd advantage that America symmetric kiss has
05:14
over asymmetric key. So to summarize to two made these advantages. You know, how can we distribute the kids securely over the Internet? And how many kids do we need to communicate
05:29
in the advantage that it has is the performance eating Crips and decreased the decrypt way faster? Because the key sizes are,
05:39
uh,
05:41
you know,
05:42
how can put this Even though the key sizes are
05:46
short, let's say that because, uh,
05:50
age metric is, has they all these algorithms uses a larger key than they seem metric algorithms. They still are secured asymmetric algorithms, for example. Yes,
06:04
this is a geometric algorithm, and it's really, really fast. And what will happen wear,
06:12
huh? 512 Children t Today equation, this algorithm becomes almost unbreakable.
06:19
The work factor to break this to break this hour through this is, like
06:26
1000 millions of years. So,
06:29
um, you know the performance. I's good. The problem is that how can we distribute this among, um,
06:38
the employees are the users. And you know, how many kids do we need? S O. What are these? Mary algorithms? Well, symmetric algorithms in both a s as well, right? Said,
06:50
um,
06:51
this is the most popular I believe it comes from 128 256 and 512. Things is the most common numbers. You know, all them multiple of eight.
07:06
Um, then we have, um,
07:10
Harrison Ford,
07:13
45
07:15
our six.
07:18
Uh oh. This also symmetric when it's asymmetric again, is that the same key has to be used at both sides of the communication. Um,
07:29
we can also mention the two feet tall fish or two fish. The serpent, the Blowfish.
07:36
I mean, write it right here
07:39
so that you can have it
07:44
to fish the blowfish.
07:50
Um, you know,
07:53
the E e s
07:56
triple this,
07:59
which right away all for example, RC for, um
08:05
uh, this and Tripolis are all you know, defecated. We cannot use it. That anymore because they're broken. Actually, RC four was the one used in the weapon authentication off the off the rotors and the wireless.
08:28
How many symmetric kids are needed in a business with a 755 employees? Well, that's a tough one. Um, what would you do? The math. Remember that the formula for this
08:41
it was actually, uh and,
08:43
well, multiple labor, my and mine's one
08:48
on this divided. But to So by using this formula, there is The result is 284,635 is a huge number.
09:01
Yeah, that how many? If you have a business with more than 1000 employees, you can see that it becomes unmanageable.
09:09
Was the bits based, advantage abusing symmetric case? Well, it has a better performance.
09:16
Um, that's the best advantage. It has other batches, but I guess that's the main one
09:22
name. And this is van. Touch of using symmetric is well, the number of kisses which, you know, was the first question becomes unmanageable. When way you go up to 20 employees or 20 users and the other one just completed. The the answer
09:41
is that how can we distribute the key securely
09:46
when we needed at both out. Its of the connection
09:50
in today's reflector would talk about the main concept off symmetric Kiss
09:56
Supplements materials again, the Phipps publication.
10:01
Looking forward. In the next video, we will cover the asymmetric algorithms. Well, that's it for today, folks, I hope in your lab, Ilya, and talk to you soon.

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor