ISSAP – Cryptography

Cryptography Principles

  • Applications of Cryptography
    • Benefits
    • Uses
    • Message Encryption
    • Security IP Communication
    • Remote Access
    • Secure IP Communication
    • Remote Access
    • Secure Wireless Communication
    • Others
    • Identification and Authentication
    • Storage Encryption
    • Electronic commerce
    • Software Code Signing
    • Interoperability
    • Methods of Cryptography
    • Symmetric
    • Block
    • Stream
    • Asymmetric
    • Hash Functions and MAC
    • DS
  • Vet Proprietary Cryptography &  Design Testable Cryptographic Systems
  • Computational Overhead & Useful Life

Key Management

  • Purpose of Keys and Key types
  • Cryptographic Strength and Key Size

Key Life Cycle

  • Key Creation
  • Key Distribution & Transit
  • Symmetric Keys Distribution
  • Public and Private Key Distribution
  • Key Storage
  • Key Update
  • Key Revocation
  • Key Escrow
  • Backup and recovery
  • Backup
  • Key recovery

PKI

  • Key Distribution
  • Certificate andKey Storage
  • PKI Registration
  • How Subject Proves its organizational Entity
  • Person Authenticates a request
  • Certificate Issuance
  • Trust Models
  • Subordinate Hierarchy
  • Cross-Certified Mesh
  • Certificate Chains
  • Certificate Revocation
  • Traditional CRL Model
  • Modified CRL-Based Models
  • Cross-Certification
  • How Applications use Cross-Certification
  • How Cross-Certification is set up
  • How Cross-Certification with a bridge CA is Implemented in Practice

Design Validation

  • Review of Cryptanalytic Attacks
  • Attack Models
  • Symmetric Attacks
  • Asymmetric Attacks
  • Hash Function Attacks
  • Network-Based Crytanalytic Attacks
  • Attacks Against Keys
  • Brute Force Attacks
  • Side-Channel Crytanalysis
  • Risk-Based Crypotgraphic Architecture
  • Identifying Risk and Requirements by Cryotographic Areas
  • Case Studies

Leave Comment

Your email address will not be published. Required fields are marked *

UA-46837009-1