111234
111234
Component Description
Secret Key A shared secret key is what allows and controls encryption between
the two parties.
Nonce/ Every session receives a random value to ensure that every
Initializatio encryption has a unique key, even if all sessions use the same key.
n Vector
(IV)
Keystream There is a device that produces a chain of random-looking bits; then,
Generator the bits are XORed with the plaintext.
XOR An exclusive OR operation combines the encrypted keystream into
Operation the plain text.
The sender and receiver start by using a shared secret key and their own unique nonce or iv.
1
Unit 30: Applied Cryptography in Cloud
Both values get mixed together to start the system inside the cipher for each session, so the
outcome is always different.
1.1.1.2Keystream Generation:
Because of the within internal state produced from the key and nonce, the cipher keeps
generating a continuous stream of pseudorandom bits or bytes. The flow is never the same
and changes slightly for every class.
1.1.1.3Encryption:
The original message is converted one bit or one byte at a time by XOR-ing it with the
keystream. As a result, the message appears in a secure, encrypted way.
1.1.1.4Decryption:
The person receiving the message uses the same key and nonce to generate the same
keystream. If you XOR this keystream with the ciphertext, the plaintext remains.
1.1.2 Algorithms of Stream Cipher
Cloud security relies heavily on different kinds of stream cipher algorithms. The adoption
of ChaCha20 in TLS has gone up because it is fast and provides strong security. Salsa20
which is faster than AES, is still trusted for those who want to use fast encryption without
support from hardware. SNOW 3G is now responsible for protecting data transmission in
today’s virtualized telecommunications networks. AES in Counter (CTR) is designed to
use the block cipher mode for AES, turning it into a stream cipher which is widely
supported by numerous cloud systems.
1.1.3 Applications of Stream Ciphers in Cloud Security
Stream ciphers are especially suitable for cloud operations with a need for real-time, low
latency, and resource-efficient transfer of data. Their byte-by-byte encryption as well as the
negligible computational overhead make them perfect for secure communication.
In actual practice, there are several global cloud service suppliers that use stream ciphers in
various situations.
1. The reason why GCP’s TLS uses ChaCha20-Poly1305 is that not all mobile and
embedded devices can do AES encryption. Changing from AES to ChaCha20 for HTTPS
communication allows Google to offer the same level of encryption, while also making
Chrome run faster for Android users.
2. Microsoft Azure Communication Services secure live media on calls and conferences by
using stream cipher algorithms. Because stream ciphers operate quickly, secret
communications in real time work well for virtual meetings nowadays.
3. Lightweight stream ciphers are used by AWS IoT Core to secure telemetry and command
information sent from simple IoT devices. Because stream ciphers don’t use much
internal memory or CPU, they can connect thousands of sensors and endpoints at the
same time.
4. Because of the regular use of stream ciphers, companies such as Cloudflare and Akamai
are able to provide encrypted content in real-time streaming. As a result, the encrypted
stream of video/audio goes through smoothly, keeping the file smaller so that people can
access it quicker and with better quality, yet still enjoy security for their data.
2
Unit 30: Applied Cryptography in Cloud
Block ciphers are strong because they scatter the influence of one text bit all through the
cipher and also create a highly complex link between the key and cipher.
1.2.1 Key Components of Block Ciphers
Following key components of block ciphers contributes to the cipher’s ability to confuse
and diffuse data, making it resistant to cryptanalysis.
Table 3 Key Components of Block Ciphers
Componen Description
t
Key Another pair of data, disguised inside a message which is used as the
“round key” generator.
Round The purpose it always carries out is to combine substitution and
Function reordering to disorient and mix up the message.
Key A way to take the given key and make several round keys for the
Scheduling encryption process.
Algorithm
Mode of Upon seeing texts with a length more than a single block, sets whether
Operation to chain or operate on them separately, in order to improve security.
3
Unit 30: Applied Cryptography in Cloud
4
Unit 30: Applied Cryptography in Cloud
it ensures low latency encryption. 🔹 Files are encrypted with AES-256 (a block
🔹 For Android devices that don’t support cipher) in place for server-side storage using
AES through hardware, Google Cloud uses AWS S3.
the ChaCha20 stream cipher to secure its 🔹 You can use it to secure static forms of data
TLS connections. such as documents, databases or backups in the
🔹 Usefulness: Lets you achieve quick and cloud, as encryption is key here and waiting time
secure HTTPS connections for mobile or is less important.
cloud API traffic that doesn’t overburden
your servers.
5
Unit 30: Applied Cryptography in Cloud
6
Unit 30: Applied Cryptography in Cloud
stream ciphers for live media encryption ease of continuous data protection (Zhou et al.,
demonstrates ease of continuous data 2020).
protection (Zhou et al., 2020). • Relevance: Preferred in cloud scenarios
• Relevance: Preferred in cloud scenarios demanding uninterrupted data flows with low
demanding uninterrupted data flows with overhead.
low overhead.
7
Unit 30: Applied Cryptography in Cloud
For encryption, if Bob wants to send a secure message M to Alice, he will get Alice’s public
key (e, n) and compute the cipher text C = M e mod n and he sends to her.
8
Unit 30: Applied Cryptography in Cloud
When she receives the ciphertext, Alice decodes the same using her private key which
involves computing M = C d mod n. Alice being the only one to have the private key, she is
the only one to be able to decrypt the message, hence its confidentiality.
9
Unit 30: Applied Cryptography in Cloud
10
Unit 30: Applied Cryptography in Cloud
of its bits and the whole secret key. It points out the authentication
lattice-based need for protecting against the was safe.
math. exposure of secret keys in
cryptography.
4.4 Risk: Implementation Flaws
Even mathematically secure cryptographic algorithms can be broken due to flawed
implementations. Hardware and software that run encryption algorithms often leak
information through unintended channels, such as execution time or power consumption.
4.4.1 Timing or Fault Leakage
When cryptographic operations are executed, their timing or behavior under intentional faults
can leak sensitive data. These side-channel attacks allow adversaries to deduce private keys
without directly attacking the encryption itself. The Bellcore Fault Injection Attack and
timing attacks are prime examples, often demonstrated on smartcards and secure hardware
modules.
Table 9 Fault Injection and Timing Attacks from Implementation Flaws
11
Unit 30: Applied Cryptography in Cloud
credentials.
4.6 Risk: Certificate Trust
The public key infrastructure (PKI) is built on trust in Certificate Authorities (CAs). If a CA
is compromised, it can issue fraudulent certificates that appear legitimate to users and
browsers, thus completely undermining the security of HTTPS and other PKI-reliant systems.
4.6.1 Compromised Certificate Authorities
When a CA is compromised, an attacker can generate certificates for any domain, tricking
users into trusting malicious sites. These certificates are indistinguishable from genuine
ones without manual inspection (Rana, 2021). The Fake Certificate Attack became
widely recognized after the DigiNotar breach.
Table 11 Fake Certificate Attack from Compromised Certificate Authorities
12
Unit 30: Applied Cryptography in Cloud
13
Unit 30: Applied Cryptography in Cloud
14
Unit 30: Applied Cryptography in Cloud
Table 12 Roles and Key Characteristics of PKE, KEM, and DEM in Public Key Systems
15
Unit 30: Applied Cryptography in Cloud
16
Unit 30: Applied Cryptography in Cloud
17
Unit 30: Applied Cryptography in Cloud
18
Unit 30: Applied Cryptography in Cloud
digital certificate to authenticate its identity to the HQ system. This certificate allows the
HQ server to confirm that the request is coming from a trusted, verified source.
6.4.5 Certificate Validation at HQ
Upon receiving the VPN connection request and associated certificate, the HQ VPN server
verifies the certificate by checking the CA’s digital signature using the CA’s public key.
This process confirms that the certificate has not been tampered with and was indeed
issued by a trusted CA. If the certificate is valid and not expired or revoked, the VPN
server allows the connection process to continue.
6.4.6 Secure Session Key Exchange
After successful authentication, a secure session key is generated and exchanged between
the TelCo Branch and HQ. This session key will be used for encrypting all data transferred
over the VPN. The exchange may use secure key agreement protocols like Diffie-Hellman
or Elliptic Curve Diffie-Hellman (ECDH), facilitated by the trust and encryption
mechanisms established through the PKI certificates.
6.4.7 Encrypted VPN Tunnel & Secure Communication
Once the session key is in place, a PKI-secured encrypted VPN tunnel is established
between the TelCo Branch and HQ. All business-critical data is encrypted using the
session key at the Branch side and decrypted at the HQ using the same key. This setup
ensures confidentiality, integrity, and authentication, enabling TelCo to securely transmit
sensitive information over the public internet without risk of compromise.
In conclusion, by integrating a Public Key Infrastructure (PKI) into TelCo’s VPN
communication framework, the organization significantly enhances the security and
reliability of its data exchanges between the Headquarters and Branch Office. The use of
digital certificates ensures strong identity verification, allowing only authenticated devices to
participate in the communication. Through the centralized role of a Certificate Authority
(CA), TelCo benefits from automated and scalable trust management, simplifying the
distribution and validation of cryptographic credentials. This architecture not only
strengthens protection against cyber threats but also ensures that sensitive business
information remains secure while traversing the public internet. Overall, PKI integration
transforms the VPN from a basic encrypted tunnel into a comprehensive, trust-based
communication system.
7 Cloud-based PKI
Cloud PKI is the implementation of Public Key Infrastructure within cloud environments,
providing a reliable framework for secure electronic data transfer. As cloud-based services
have become the new normal, with advantages like scalability, cost-effectiveness, and
flexibility, traditional security methods are no longer adequate. In this dynamic, scalable, and
distributed infrastructure, PKI plays a vital role in mitigating security risks, helping to
safeguard the virtual world and enabling secure digital interactions in the cloud era
(Cybellium, 2023).
19
Unit 30: Applied Cryptography in Cloud
20
Unit 30: Applied Cryptography in Cloud
21
Unit 30: Applied Cryptography in Cloud
possible operational location, which again multiplies the number of high-value secrets in
circulation (Ms. Heena Kharche, 2012).
8.5.1 Potential Impacts
Migrating private keys between systems introduces serious risk of interception,
duplication, or mishandling. Without secure methods, attackers may access or reuse key
material. Improper deletion at the source can leave keys exposed. These risks undermine
the security and trustworthiness of the CA infrastructure
8.5.2 Mitigation Strategies
Use secure key wrapping and split-knowledge techniques for manual transfers. Whenever
possible, generate keys locally to avoid risky migrations. Maintain full chain-of-custody
documentation during key movement. Alternatively, apply key derivation functions
instead of moving actual private keys
22
Unit 30: Applied Cryptography in Cloud
23
Unit 30: Applied Cryptography in Cloud
Vulnerability Description
Single CA Trust The entire system relies on one CA,
creating a single point of failure.
Inadequate Certificate Checks VPN endpoints only verify signatures, not
the legitimacy of the certificate issuer.
Lack of Certificate Pinning VPN clients accept any certificate from the
CA, without verifying specific keys.
Static Key Management Predictable key generation allows attackers
to replicate session keys.
Absence of Certificate No public logging or real-time revocation
Transparency and Revocation checks mean fraudulent certificates remain
Checking unnoticed.
24
Unit 30: Applied Cryptography in Cloud
MITM attacks. By housing the CA's private key within a FIPS 140-2 or 140-3 certified
HSM, TelCo ensures that key extraction, unauthorized usage, or tampering becomes
virtually infeasible, even in the event of a server breach. Technically, the HSM is
integrated with the CA software, enforces strict access controls, and logs all cryptographic
operations, guaranteeing the integrity and confidentiality of the CA’s core credentials.
9.5.2 Threshold Cryptography
Threshold cryptography introduces distributed control over sensitive cryptographic
operations by splitting a private key into multiple components and requiring a subset of
these parts to cooperate for signing. In TelCo's security architecture, this is implemented
as a 3-of-5 scheme across multiple, geographically and administratively isolated
Certificate Authorities, ensuring that no single CA compromise can result in rogue
certificate issuance. This tool is crucial because it eliminates the single point of failure
inherent in traditional PKI models and drastically increases the cost, complexity, and risk
of a coordinated attack. Practical implementation involves using secret-sharing algorithms
such as Shamir’s Secret Sharing, combined with threshold-aware versions of RSA or
ECDSA for certificate signing, coordinated through secure multi-party computation
protocols.
1. Certificate Transparency (CT)
Certificate Transparency (CT) was fully implemented to make certificate issuance within
TelCo's domains and subdomains more open and clear. Selected and actively sent out all
the new certificates for TelCo’s VPN endpoints, web servers and other major systems to a
variety of independent Certificate Transparency logs (such as Argon and Nimbus run by
Google and Cloudflare, respectively). This system records every TelCo domain certificate
in a transparent and append-only public log. For the CT system to respond immediately to
security issues, a modern system for observing activity was established. This infrastructure
frequently examines CT logs to see if certificates were created for any of TelCo's
registered domains or subdomains not expected or allowed by the company’s internal cert
management tools. Suites of automated verification tools were set to detect unauthorized
or "rogue" certificates. If a suspicious event is detected, an instant alert is given to the
security operations center (SOC) and incident response teams. By using a prepared
response policy, organizations can react quickly to a threat and pull the certificate as soon
as the attack is found and take supplementary actions. Watching CT logs plays an
important role in spotting fake certificates or those distributed from a compromised CA,
acting as an external defense and backing up internal security measures.
signed by its associated CA. Rather, the client takes the server’s public key from the
certificate, computes the hash of the key and compares it to the initial hash of the URL.
After that, the computed hash is matched against a list of trusted, already installed hashes.
When a VPN client receives a valid but risky certificate from a suspicious CA, with a
public key that is different from any pinned secure hashes, the VPN will instantaneously
block the connection. Because of this system, it becomes very difficult for such an attacker
to launch a MitM attack using fraudulent certificates, despite gaining access to a trusted
CA’s genuine certificate.
4. Short-Lived Certificates
Limiting the amount of time vulnerable or fake certificates could be used, TelCo made
Short-Lived Certificates their normal standard in the internal CA. The period each
certificate for internal VPN endpoints, servers and users was set to was between 24 and 48
hours. Because of the short validity period, the window open to misusing a stolen
certificate and doing cause harm is severely limited. To guarantee no interruptions and low
administrative burden, renewing certificates was fully automated and coordinated on all
VPN devices. Agents installed on endpoints and servers keep an eye on certificates and
obtain new ones automatically from the CA before the current ones expire, making sure
VPN use isn’t interrupted. Rapid renewal makes it necessary to adjust cryptography
routinely and with OCSP stapling in real-time, anomalies can be detected and a malicious
use of a certificate is curtailed to the smallest possible timeframe.
27
Unit 30: Applied Cryptography in Cloud
It was challenging for TelCo to make VPN clients compatible across different operating
systems due to the requirement to use Perfect Forward Secrecy with Ephemeral Elliptic
Curve Diffie-Hellman (ECDHE). Ensuring that all platforms used the same strong and
secure cryptographic setup was not easy. Also, adjusting how often secret keys are
replaced in a way that ensures maximum security and has little impact on efficiency or
resource use in gateways required an extensive testing process.
5. High-Volume Short-Lived Certificate Automation:
Issuing and renewing certificates for short periods (lasting just 24-48 hours) increased the
amount of work for internal VPN access and user authentication. Because of this, a system
had to be created and put in place that was very reliable, tolerant to errors and completely
managed automatically. It was a big challenge to make sure the corporate CA could handle
the increased workload, without affecting the reliability of the self-enrolment and self-
renewal features everywhere and not leaving the team needing to step in often.
6. OCSP Responder Resiliency and Fail-Closed Risks:
risk linked to the "fail-closed" OCSP setting. While this provides the best security (not
allowing the use of certificates that failed to be verified), if any problem arose with OCSP
responders or their servers, all users with working VPNs would be denied service and face
service disruptions. To deal with this risk, plans were made for extreme backup systems,
continual monitoring of all responders and quick procedures for dealing with any system
breakdowns.
3. Conclusion
The addition of these six features – Hardware Security Modules (HSMs), Threshold
Cryptography, Public Key Pinning (PKP), Perfect Forward Secrecy (PFS), Short-Lived
Certificates and OCSP/OCSP Stapling – makes TelCo’s VPN network more secure.
Employing these strategies, guided by cryptography and cryptanalysis, gives TelCo’s
important communication more confidentiality, integrity and availability. Because TelCo
is aware of vulnerabilities and ready for the next threat, the company has built a
dependable structure for its worldwide business. Ongoing verification, watching for
threats and developing future plans help TelCo keep its position as a cybersecurity leader,
protecting its assets and consumers in the face of new risks..
4. Symmetric Cryptography
Symmetric cryptography uses the same key for both the process of security and its
opposite, security unravelling. It is popular because encrypting big data sets in cloud
environments requires its high speed, low use of processing power and efficiency. The
biggest problem is sharing the encryption key securely on networks and this calls for more
security measures.
1. Common Symmetric Algorithms
Below are some widely used symmetric encryption algorithms in cloud security
applications:
Table 16 Common Symmetric Algorithms
Algorithm Detailed Description
AES AES is the current industry standard for symmetric encryption and
(Advanced supports 128, 192, or 256-bit keys. It is a block cipher that operates
Encryption on 128-bit blocks and is known for its robustness against brute-
Standard) force attacks. Widely adopted in cloud services like AWS and
Azure for securing data at rest and in transit.
ChaCha20 ChaCha20 is a modern stream cipher that provides strong security
and faster performance than AES in software-based environments.
It uses a 256-bit key and a 96-bit nonce and is resistant to timing
attacks, making it ideal for mobile and cloud applications. It is
often used in TLS 1.3 as an alternative to AES-GCM.
3DES (Triple 3DES enhances the original DES algorithm by encrypting data
DES) three times using three 56-bit keys, effectively creating a 168-bit
key length. Although more secure than DES, it is slower and
29
Unit 30: Applied Cryptography in Cloud
30
Unit 30: Applied Cryptography in Cloud
3. Key Management Scalability makes it simple to deal with encryption keys in large
cloud settings where many people are using the system. As more users are added,
public key infrastructures relieve administrative work and help keep operations
secure.
4. Because each cloud tenant gets unique key pairs, asymmetric encryption helps keep
user data more protected by separating it from other accounts. Because tenants don’t
share resources in the same way, the chance of one tenant taking data from another is
greatly reduced
6. . Hybrid Cryptosystems
By combining symmetric and asymmetric cryptography, hybrid cryptosystems gain
considerable advantages. Normally, asymmetric encryption is used to share a symmetric
key that can be used for efficient data encryption. This way of working helps ensure
security and speed, so it’s suitable for cloud, VPN and secure file transfer services. It deals
with sharing secret keys, similar to what symmetric cryptography does, but without facing
the slowdowns of using only asymmetric cryptography.
1. Common Hybrid Implementations:
Several well-known protocols use hybrid cryptosystems to balance security and
performance in cloud applications:
Table 18 Common Hybrid Implementations
Hybrid Detailed Description
System
TLS/SSL TLS (and its predecessor SSL) is the backbone of secure internet
31
Unit 30: Applied Cryptography in Cloud
3. Among the many Cloud Implementation Advantages is that basic tasks such as key
management, are simplified and less expensive. Merging private, public and hybrid
clouds through hybrid systems guarantees uniform security and better dependability.
4. Protocol Flexibility is able to run protocols like TLS and IPsec, ensuring that it can
work with many different systems. Thanks to this flexibility, cloud providers are able
to manage several types of communication and successfully combine different cloud
systems.
7. Cryptographic Hash Functions
Cryptographic hash functions process data and create a set hash value of the same size that
is always different for each input. They are applied to ensure that data cannot be altered,
protect passwords, seal digital documents and remove identical data. Hash functions used
in cloud systems should be collision-resistant, pre-image resistant, be fast and keep data
safe under large-scale or hostile attacks.
32
Unit 30: Applied Cryptography in Cloud
2. Added salt and increased calculation in storing passwords are features of adaptive
hashing algorithms like bcrypt. It greatly hinders brute-force attacks and makes user
credentials in the cloud more secure, so they are less likely to be compromised.
3. It allows cloud storage to identify and remove duplicate data blocks by using hashing.
Thanks to this, resources are used efficiently, costs are down and both customers and
providers have better security.
4. Using hash functions is how support for Digital Signatures and Blockchain ensures
that records stay unchanged. This is essential for safe protection of transactions and
records on the cloud, helping make cloud financial and legal dealings more
trustworthy.
8. Evaluation of Cryptographic Methods for Cloud Security
33
Unit 30: Applied Cryptography in Cloud
The analysis has found that no cryptographic technique can fully meet all of the
security requirements of the cloud on its own. It is great at handling large volumes of data,
but it faces problems distributing keys, so it usually uses asymmetric cryptography.
Although it secures identity and communication very well, asymmetric cryptography
requires additional effort to perform computations. These types of cryptosystems are the
best because they manage security and performance well in busy cloud settings. Ensuring
both the integrity of data and the security of authentication depends greatly on
cryptographic hash functions. Having these techniques together ensures more secure
protection for the assets stored in the cloud.
3. P7 Assess common factors influencing an organizations choice of cloud
solution(s) to improve security.
34
Unit 30: Applied Cryptography in Cloud
can see in the following sections what these key aspects include.
35
Unit 30: Applied Cryptography in Cloud
and give help in securing the customer’s system. Knowing this model prevents problems
from unclear lines of security. For this reason, it’s an important consideration when
switching to cloud computing (Rahimli, 2013).
centres. Thanks to these features, organizations can bounce back fast and lose little data. A
well-thought-out disaster recovery plan can help prevent long periods of inactivity which
are both costly and dangerous for a company's image. Services on the cloud that help with
fast recovery increase feelings of peace of mind. Therefore, businesses must pay special
attention to cloud continuity when choosing their strategy (Rahimli, 2013).
10. Geographic Data Residency
A number of countries and fields need data to be safeguarded within specified
geographical areas. It happens because of privacy laws and fears that foreign governments
might access or monitor our information. It is necessary for organizations to choose cloud
providers whose data centres are in locations that are acceptable by law or policy. If data is
stored remotely, it can slow down access, lead to performance issues and make it harder to
control who can get at the data. Those that let you choose where your information goes are
more adaptable and follow rules better. Because of this, choosing the right location plays a
key role in adopting cloud services.
37
Unit 30: Applied Cryptography in Cloud
AES-128 offers high efficiency in data encryption, with performance advantages (20-40%
faster than AES-256) ideal for real-time data operations. It integrates well with all major
cloud services and benefits from hardware-level acceleration such as AES-NI. Developers
can implement it with ease using mature, well-tested libraries across programming
environments.
3. Weaknesses
Despite its practical security, AES-128 offers a smaller theoretical security margin than
AES-256, making it less resilient to emerging threats like quantum attacks. CBC mode’s
reliance on proper IV management and lack of built-in authentication introduces potential
vulnerabilities. Its security heavily depends on implementation accuracy.
4. Critical Implementation Considerations
Organizations should leverage cloud-native key management systems to maintain key
security. IVs must be randomly and uniquely generated for each encryption operation to
prevent block replay attacks. Additionally, secure padding practices are essential to avoid
oracle vulnerabilities, and key rotation policies (every 90 days) should be strictly enforced.
In regions with constrained IT expertise or tooling, automation of IV generation and
key rotation using cloud services becomes critical to prevent misconfigurations.
5. Asymmetric Encryption – RSA-2048
Selected Algorithm: Rivest–Shamir–Adleman (RSA-2048) RSA is a public-key
encryption system based on the mathematical difficulty of factoring large prime numbers.
RSA-2048 uses a 2048-bit key size for operations such as key exchange and digital
signatures. It is widely deployed in digital certificates, secure emails, and web encryption.
1. Strengths
RSA-2048 is universally supported across platforms and libraries, simplifying adoption. It
integrates well with existing PKI systems, enabling secure key exchanges and
authentication. Its maturity ensures that most potential issues are well-documented with
available solutions, making implementation relatively straightforward.
2. Weaknesses
The algorithm is computationally intensive, especially for encryption, decryption, and key
generation. Its large key sizes lead to increased transmission and storage overheads. RSA-
2048 is also vulnerable to quantum computing threats and may require migration strategies
within the next decade.
3. Critical Implementation Considerations
Private keys must be stored securely in hardware security modules or trusted execution
environments. Proper prime generation is essential to prevent factorization attacks.
Organizations should anticipate processing delays in high-volume environments and
develop a transition plan to quantum-resistant alternatives when needed.
Given that many regional enterprises lack access to HSMs or advanced
cryptographic tools, cloud-based PKI services can bridge this gap effectively.
6. Cryptographic Hash Function – SHA-256
Selected Algorithm: Secure Hash Algorithm 2 (SHA-256) SHA-256 is a member of the
SHA-2 family and generates a fixed 256-bit output from any input. It is widely used for
data integrity verification, digital signatures, and password hashing, thanks to its
cryptographic strength and computational efficiency.
1. Strengths
38
Unit 30: Applied Cryptography in Cloud
SHA-256 offers robust collision resistance and is accepted globally for securing sensitive
data. It performs efficiently across platforms and aligns with major security standards like
FIPS and PCI-DSS. The fixed output length also simplifies integration into diverse
systems like APIs, logs, and password databases.
2. Weaknesses
Without enhancements like salting or key stretching, SHA-256 may be vulnerable to
brute-force attacks using specialized hardware. Improper implementation can lead to
susceptibility to length extension attacks. It also offers limited quantum resistance, which
may necessitate future updates.
3. Critical Implementation Considerations
To strengthen password storage, SHA-256 should be combined with key stretching
methods like PBKDF2 or bcrypt. Salting must be applied to each hash to prevent
dictionary attacks. Inputs should be validated and outputs compared using constant-time
functions to reduce timing attack risks. Since cybersecurity awareness and best
practices can be inconsistent across teams, adopting pre-configured cryptographic
libraries is essential to minimize implementation errors.
7. Hybrid Cryptosystem – Managed TLS
Selected Algorithm: Transport Layer Security (TLS) using RSA and AES TLS is a
hybrid cryptographic protocol that uses asymmetric algorithms (like RSA or ECDHE) for
secure key exchange and symmetric encryption (typically AES) for data transmission.
Managed TLS services offered by cloud providers simplify configuration and automate
certificate management.
1. Strengths
Managed TLS implementations ensure best-practice configurations, automatic protocol
updates, and patching without user intervention. They enhance security through features
like protocol negotiation, high availability, and performance tuning. Certificate lifecycles
are also automated, reducing human error.
8. Weaknesses
Cloud-managed TLS solutions reduce visibility into configuration and restrict advanced
customization. This can create over-reliance on a single vendor, leading to potential lock-
in. Organizations also surrender some control over security parameter selection, relying on
provider defaults.
1. Critical Implementation Considerations
Enterprises must retain control over their certificate private keys and enforce strong TLS
versions and cipher suites. Despite automation, continuous monitoring of TLS metrics is
crucial. A multi-provider strategy may mitigate vendor-specific vulnerabilities and ensure
consistent availability of secure communication services.
For businesses in developing markets, managed TLS reduces the operational burden
of securing data in motion without requiring deep in-house cryptographic expertise.
39