CISSP · · 4 min read

Applying Cryptography: TLS, IPsec, Email Security, and Crypto in the Wild

Cryptography in theory is easy. Cryptography in practice breaks. Learn TLS, IPsec, email security, and VPN protocols for CISSP Domain 3.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Knowing AES and RSA is necessary but not sufficient. The real questions are: how does TLS negotiate a session? What is the difference between IPsec transport and tunnel mode? Why does S/MIME use hybrid encryption? Domain 3 tests your understanding of cryptography in action, not just in theory.

Core Concept Explained Simply

Cryptographic protocols assemble primitives (symmetric encryption, asymmetric encryption, hashing, digital signatures) into working systems that protect real-world communications. Understanding how these protocols work, and where they can be misconfigured, is essential for both the CISSP exam and practical security architecture.

TLS (Transport Layer Security)

TLS is the protocol that secures HTTPS, email transport, VPN connections, and most modern encrypted communications. The TLS handshake establishes a secure session through several steps:

  1. Client Hello: The client sends supported cipher suites and a random value.
  2. Server Hello: The server selects a cipher suite and sends its certificate.
  3. Key Exchange: The client and server establish a shared secret using asymmetric cryptography (typically ECDHE).
  4. Session Keys: Both sides derive symmetric session keys from the shared secret.
  5. Encrypted Communication: All subsequent data is encrypted with the symmetric session keys.

TLS 1.3 improved on 1.2 significantly:

IPsec (Internet Protocol Security)

IPsec secures network-layer communications and is the foundation of most site-to-site VPNs. It has two core protocols:

IPsec operates in two modes:

IKE (Internet Key Exchange) is the protocol that negotiates IPsec security associations and establishes keys before the encrypted session begins.

Email Security

Two primary standards protect email:

Both use hybrid encryption: asymmetric cryptography protects the session key, and symmetric encryption protects the message body. The key difference is the trust model, not the cryptographic mechanisms.

SSH (Secure Shell)

SSH provides encrypted remote access and file transfer. It authenticates using passwords, public keys, or certificates. SSH key management (distributing, rotating, and revoking keys) is a common operational challenge.

VPN Architectures

Blockchain Basics

Blockchain uses cryptographic hashing and consensus mechanisms to create immutable, distributed ledgers. Each block contains a hash of the previous block, making tampering evident. While primarily associated with cryptocurrency, the underlying concepts of hash chaining and distributed consensus are relevant to data integrity applications.

CISSP Lens

The exam tests IPsec components heavily. Know that AH provides integrity only (no encryption) and ESP provides both confidentiality and integrity. Know that tunnel mode is for site-to-site VPNs and transport mode is for host-to-host communication.

TLS questions test your understanding of the handshake process and why specific components matter (cipher suite negotiation, certificate verification, key exchange).

For email security, know that S/MIME uses PKI (certificates) while PGP uses a web of trust. The exam may describe a scenario and ask which trust model is in use.

Real-World Scenario

An organization deployed a remote access VPN with split tunneling enabled to reduce bandwidth costs. Remote workers connected to the corporate network for internal applications while accessing the internet directly for everything else.

An attacker compromised a remote worker's home network through an insecure IoT device. Because the worker's laptop was connected to both the corporate VPN and the compromised home network simultaneously, the attacker used the laptop as a bridge. They routed through the split tunnel connection into the corporate network, bypassing the perimeter firewall entirely.

Post-incident, the organization evaluated two options: switching to full tunneling (which would increase bandwidth costs) or keeping split tunneling with additional controls (endpoint security agents, network access control that verified device posture before VPN connection, and DNS-based filtering for non-VPN traffic). They chose enhanced split tunneling with mandatory endpoint protection, accepting the residual risk with documented compensating controls.

Common Mistakes and Misconceptions

Actionable Checklist

Key Takeaways

Exam-Style Reflection Question

An organization needs to encrypt all traffic between two office locations across the internet. Which IPsec mode is most appropriate?

Answer: Tunnel mode. It encrypts the entire original IP packet and encapsulates it in a new IP header, making it suitable for site-to-site VPN connections. Transport mode encrypts only the payload and is used for end-to-end communication between two hosts, not between networks.

Read next

© 2025 Threat On The Wire. All rights reserved.