Symmetric vs. Asymmetric Review

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
15 hours 43 minutes
Difficulty
Advanced
CEU/CPE
16
Video Transcription
00:00
>> Let's continue our discussion on
00:00
symmetric versus asymmetric cryptography
00:00
because I think this is something that you really
00:00
want to be solid on before you move on,
00:00
before you go into SSL or
00:00
IPsec or any of those other implementations.
00:00
Symmetric cryptography,
00:00
when we look at cryptography as a whole,
00:00
we have these two basic types.
00:00
We have symmetric and we have asymmetric.
00:00
When we look at the symmetric algorithms, remember,
00:00
symmetric algorithms are fast
00:00
and we want to use them to encrypt our bulk data.
00:00
But we had some of those drawbacks that we talked
00:00
about, out-of-band key exchange.
00:00
We had the problems of not being able
00:00
to get authenticity and integrity.
00:00
We had the problem of key distribution.
00:00
We had all these problems, but
00:00
we said because it's fast,
00:00
we really want to use it.
00:00
Now, symmetric ciphers can either be stream or block.
00:00
Stream encrypts bit by bit.
00:00
Remember that process of exoring that we looked at.
00:00
Stream ciphers are very fast,
00:00
but they're less secure.
00:00
The vast majority, as a matter of fact,
00:00
everything except RC-4 that
00:00
was symmetric that we looked at,
00:00
they were block algorithms or block ciphers.
00:00
The most common was and is AES.
00:00
That's the current standard that the government uses to
00:00
protect sensitive, but unclassified information.
00:00
It's the de facto standard for
00:00
the vast majority of applications.
00:00
DES and then Triple DES were the predecessors to AES.
00:00
Now, whenever you're in doubt,
00:00
when you get a question that says,
00:00
which encryption algorithm is used to?
00:00
If you don't know the answer,
00:00
you should probably guess AES because that's
00:00
just the de facto standard for most algorithms.
00:00
Which encryption algorithm is used to
00:00
protect communications in a carburized environment?
00:00
Yes. When in doubt, go with AES.
00:00
There's one exception though.
00:00
There's an email application
00:00
called Pretty Good Privacy, PGP.
00:00
It came to us from Phil Zimmermann.
00:00
Phil Zimmermann was a big advocate
00:00
for privacy and still is.
00:00
The idea that Zimmermann had was look,
00:00
most of the algorithms that we're using come
00:00
from the government or they are
00:00
based on government standards.
00:00
Knowing that the government would like to
00:00
be able to decrypt anything encrypted,
00:00
why would we use
00:00
standards that are blessed by the government?
00:00
In his thought was maybe
00:00
the government has a backdoor into those algorithms.
00:00
Zimmermann created
00:00
his own proprietary email application called PGP.
00:00
He created a proprietary algorithm called IDEA,
00:00
which stands for Internet Data Exchange Algorithm.
00:00
I want you to guess AES when you don't know the answer.
00:00
But if the question is about PGP,
00:00
it used the algorithm IDEA.
00:00
[NOISE] That's the symmetric side
00:00
of things over on the asymmetric side.
00:00
Asymmetric algorithms use factorization
00:00
or a math function called
00:00
discrete logarithms in a finite field.
00:00
That's a big heavy discussion for another day.
00:00
Almost all of them use discrete logarithms.
00:00
The exception to that,
00:00
if you'll remember, was RSA.
00:00
RSA, the relationship between the keys is
00:00
based on the idea that
00:00
it's very easy to multiply
00:00
two really large prime numbers together,
00:00
but it's incredibly difficult to
00:00
factor out what numbers were used.
00:00
That's the relationship with the keys.
00:00
The others use this concept of discrete logarithms.
00:00
We're not going to go into that in this class.
00:00
But Diffie-Hellman and ECC and
00:00
ElGamal, everything but RSA.
00:00
Again, just a last little chart that's a wrap up.
00:00
You may want to do a screen capture here just so that
00:00
you have this and make sure that you're solid on,
00:00
how keys are addressed,
00:00
where the performance issues are,
00:00
how many keys are necessary or
00:00
would be needed in each environment.
00:00
This is a good wrap up.
00:00
We just wanted to roll
00:00
everything together and make sure we have
00:00
an understanding of the way symmetric algorithms
00:00
work versus the way asymmetric algorithms work
Up Next