Applications Of Cryptography Flashcards
Define SSL
Secure Sockets Layer
SSL uses asymmetric encryption with digital certificates to negotiate a connection between browser and server, agreeing the types of encryption they both support, and once the connection is established they will use symmetric encryption to pass the traffic.
Define IPsec
Internet Protocol Security.
Suite of Protocols
Both sender and receiver must exchange digital certificates.
Transport mode only the payload is encrypted and Tunnel Mode where the whole packet is encrypted.
Define SSH
Secure Shell is a program used to log into another device over a network.
Logging in via ssh can be done using a username/password combination or using an asymmetric key pair, which is generally more secure.
Define PGP
Pretty Good Privacy
PGP is used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and to encrypt stored files.
Define WEP
Wired Equivalent Privacy
A security algorithm for Wi-Fi networks.
WEP uses the stream cipher RC4. It generally uses either a 64 bit or 128 bit key.
Define WPA
Wi-Fi Protected Access
256 bit key
Comes in WPA and WPA2
TKIP
Temporal Key Integrity Protocol