Where does Ciphering & Encryption occur?


 
Thread Tools Search this Thread
Special Forums Cybersecurity Where does Ciphering & Encryption occur?
# 1  
Old 12-20-2013
Where does Ciphering & Encryption occur?

Hello everyone. Upon reading the recent news about the NSA paying RSA to use a faulty cipher suite for it's default, it got me thinking... During a connection say for SSL, what is it that "knows" the rules for ciphers? Are these rules stored on the NIC? can they be edited, changed or appended? They are ordered obviously with the "Best" put first so is this on a file or something? How and where are these protocols stored on chips?
# 2  
Old 12-21-2013
They are algorithmic, and are completely free and open. All ciphers depend on mathematical difficulty (long long long computation to decode, as in years), not secrecy.
Any cipher that depends on a "secret" algorithm is practically guaranteed to be garbage. Any dependable cipher that is commonly used has had mathematicians and computer scientists pound on it for years. AES128, RSA, DES3, etc., all went thru this process.

After a while, someone publishes a method to speed up cracking the cipher. It gets dropped from favor, and new ones are tested and tested. RSA is in that boat.

The goal of ciphers is perfect forward secrecy. Meaning every one knows the rules and how the computation works, but doing the computations could take literally forever.

Hashes are different. Passwords are hashed. These depend on being able to enter some characters on a keyboard and getting the particular hash (string of numbers) that is saved as the hash. One of the reasons /etc/shadow has 400 permissions is: if you know the hash you can use trial and error to get a collision (an accidental hash) that matches the saved hash. And then break in. This is a case where some secrecy adds to security. MD5 is a hash that someone has shown how to match a known hashed result. Takes a big computer time to do it, bu it is at least slightly feasible. So MD5 is going out of favor.

ssh encrypts all connections with block ciphers. As a sysadmin you get to choose one of usually a dozen block ciphers. By default the system automatically changes the cipher's key every hour.

There may not be a best cipher every time. If you always send AES128, and the bad guys figure that out it becomes very, very slightly possible to crack it. Meaning some published result shows how to launch an attack with a smal but measurable possibility of breaking it. Part of encryption is to block data with junk and to change ciphers periodically. Places the odds in our favor.
# 3  
Old 12-21-2013
Quote:
Originally Posted by jim mcnamara
The goal of ciphers is perfect forward secrecy. Meaning every one knows the rules and how the computation works, but doing the computations could take literally forever.
Humm. From Wikipedia. In cryptography, forward secrecy (also known as perfect forward secrecy or PFS) is a property of key-agreement protocols that ensures that a session key derived from a set of long-term keys will not be compromised if one of the long-term keys is compromised in the future.

Quote:
ssh encrypts all connections with block ciphers.
SSH also supports arcfour which is a stream cypher.
# 4  
Old 12-22-2013
FWIW. Openssh 2.1 - the one we have on 4 M4000's does not support arcfour - Solaris 10 5/09.

The definition you gave for PFS is completely correct - thanks.
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Solaris

Zfs send & receive with encryption - how to retrieve data?

Good morning everyone, I'm looking for some help to retrieve data in a scenario where I might have made a big mistake. I'm hoping to understand what I did wrong. My system is made of two Solaris 11 Express servers (old free version for evaluation). The first if for data and the second is... (7 Replies)
Discussion started by: rnd
7 Replies

2. Solaris

Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm

Hi All Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10. Regards (4 Replies)
Discussion started by: amity
4 Replies

3. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

4. UNIX for Dummies Questions & Answers

C shell loop problem occur

Hi all, i create 2 file Config path1 5 group1 path2 6 group2 path3 10 group1 path4 15 group2 Confine group1 andrew group2 alan In my C shell script i write like this: set line_array = (`cat $app_dir/config`) set line_array_2 =... (0 Replies)
Discussion started by: proghack
0 Replies

5. Solaris

encryption & decryption functions in sun solaries

hi, is there any library functions available in sun solaries for encryption and decryption functions. regards suresh (1 Reply)
Discussion started by: suresh_rtp
1 Replies

6. Shell Programming and Scripting

how many times a word occur in afile

i want a shell script program for how many times a word occur in a file. i need not the line number but i want the counts of the particular word for eg:- hai how r u.. i am from andhra pradesh.. i am from tenali.i need this answer.i need it urgently.. i hope u will answer this ... ... (9 Replies)
Discussion started by: madhu.it
9 Replies

7. Shell Programming and Scripting

Why SIGKILL will occur?

Hi Gurus, I am executing my Datastage jobs on UNIX operating System. While running the jobs i am getting the following error: main_program: Unexpected termination by Unix signal 9(SIGKILL) Can any one please let me know what are the possible situations where this SIGKILL will arrise? ... (9 Replies)
Discussion started by: choppas
9 Replies

8. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
Login or Register to Ask a Question