From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Guidelines and standards in cryptography
From the course: Ethical Hacking: Cryptography
Guidelines and standards in cryptography
- [Presenter] There are several guidelines and standards related to cryptosystems as follows: FIPS 140-3, GAK, X.509. I'll highlight three items from NIST SP, the 800-57, the 800-175B, and the 1800-38. Keep in mind as we go through each of these items that guidelines are more like advice and standards are strictly enforceable by the government. Let's start with FIPS or the Federal Information Processing Standard 140 v3. It has four levels of capability dictated by the U.S. government to protect cryptographic keys and guarantee confidentiality of data contained inside cryptographic boundaries. You can see what this looks like from the diagram on their site. The latest version has more robust key management and authentication systems. At level one, you'll need to specify a relevant cryptographic algorithm, which hasn't been discontinued. For instance, we learned that the original symmetric algorithm Data Encryption Standard or DES was deprecated, which means it's no longer recommended…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.