This lesson familiarizes the student with basic threats to confidentiality and explains how cryptography can help to ensure confidentiality via PAIN (Privacy, Authentication, Integrity, and Non-repudiation). This lesson also explains the cryptography process and discusses symmetric versus asymmetric cryptography, looking at several pieces and parts of modern cryptography to include key exchange, key management (private and public keys), PKI, and digital signatures. Finally, it provides the student with several examples of cryptographic algorithms and explains cryptographic hash functions and their uses.
- Describe common threats to confidentiality
- Understand the benefits of encryption for confidentiality
- Distinguish symmetric and asymmetric key cryptography and in what situations each are useful
- Define key exchange, key management, and digital certificates
- Describe hash functions and their uses
- K0018: Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).
- K0019: Knowledge of cryptography and cryptographic key management concepts.
- K0044: Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- K0056: Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).
- K0305: Knowledge of encryption algorithms, stenography, and other forms of data concealment.
- K0308: Knowledge of cryptology.
- Basic Cryptography (BCY)