Comparing and Contrasting the Basic Concepts of Cryptography
In this section, we are going to outline the uses of different aspects of cryptography.
Asymmetric – PKI
Asymmetric keys are obtained from a CA. If you are selling products or services with external entities, then you need to obtain your X509s from a public CA; otherwise, your internal certificates will not be accepted.
Asymmetric – Weak/Depreciated Algorithms
SSL should now be depreciated as it is weak; an example of an exploit is the POODLE attack, which is a man-in-the-middle attack that exploits the vulnerabilities of SSL 3.0 using CBC. Asymmetric algorithms should not be using a key whose strength is 2046 or lower. However, an SSL VPN is the only VPN that uses an SSL certificate and works with legacy clients.
Asymmetric – Ephemeral Keys
Ephemeral keys are short-lived keys that are used for a one-time-only session. There are two types of ephemeral keys: Diffie Hellman Ephemeral...