From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Guidelines and standards in cryptography

Guidelines and standards in cryptography

From the course: Ethical Hacking: Cryptography

Guidelines and standards in cryptography

- [Presenter] There are several guidelines and standards related to cryptosystems as follows: FIPS 140-3, GAK, X.509. I'll highlight three items from NIST SP, the 800-57, the 800-175B, and the 1800-38. Keep in mind as we go through each of these items that guidelines are more like advice and standards are strictly enforceable by the government. Let's start with FIPS or the Federal Information Processing Standard 140 v3. It has four levels of capability dictated by the U.S. government to protect cryptographic keys and guarantee confidentiality of data contained inside cryptographic boundaries. You can see what this looks like from the diagram on their site. The latest version has more robust key management and authentication systems. At level one, you'll need to specify a relevant cryptographic algorithm, which hasn't been discontinued. For instance, we learned that the original symmetric algorithm Data Encryption Standard or DES was deprecated, which means it's no longer recommended…

Contents