Chapter 11: Securing TCP/IP Flashcards
What is nonrepudiation?
-data is same as originally sent, came from source I think it should have come from.
What is authentication?
-verifcy whoever accesses the data is the person I want to access it.
What is authorization?
-what a person who accesses the data can do with the data.
What is a cipher?
-general term for a way to encrypt data.
What is an algorithm?
mathematical formula underlies the cipher.
What is a complete algorithm?
cipher and implementation of the cipher.
What is ciphertext?
result from running cleartext through a key.
what is a symmetric key algorithm?
uses same key to encrypt and decrypt
What is asymmetric key algorithm?
-different keys for encryption.
What is a block cipher?
encrypt data in single chuncks
What is a stream cipher?
-encrypts data a single bit at a time.
Describe DES.
Data encryption standard
- grandaddy of all TCP/IP symmetric-key algorithms.
- 64 bit block and 56-bit key.
Describe AES.
Advanced Encryption Standard
- block cipher
- 128-bit block size
- 128, 192, 256-bit key size.
- used in applications from file encryption to wireless networking, to web sites.
what is public-key cryptography?
-keys can exchange securely
What is RSA?
Rivest Shamier Adleman
- improvement to Diffre-Hellman public-key cryptography
- enables secure digital signature.
Describe the encryption at the different levels at OSI.
- Level 1: no common encryption
- level 2: scramble all data in ethernet frame except mac address info.
- layer 3: IPSEC: software that encrypts everything inside packet.
- layer 4: TCP/UDP do not offer encryption.
- layer 5: and 6: not comon for encryption.
- layer 7: SSL/TLS
How is non-repudiation implemented?
- most cryptographic hash function
- results in checksum or digest.
Describe MD5
Message-Digest Algorithm version 5
- some SMTP servers use this
- most popular hash function.
- CRAM-MD5: tool for server authentication.
Describe SHA
Secure Hash algorithm
-sha-1 and sha-2
What is a digital signature?
- generated by sender to message and private key
- person with matching publick key verifies it came from intended sender.
What is PKI?
Public-key infrastructure
-certificate: standardized type of digital signature that includes signature of a third party.
Describe PGP.
Pretty Good Privacy
- web of trust
- group of peers that trust each other.
- email encryption: you get a certificate.
Decribe GPG>
GNU privacy guard
-alternate to PGP
What is an ACL?
Access control list.
-defined list of permissions specify that an authenticated user may perform on a shared resource.
What are three ACL access models?
- mandatory access control(MAC): every resource assigned a label.
- Discretionary access control(DAC): resource owner assigns access.
- Role-based access control(RBAC): most popular model and is an access based on role(group).
What is PPP?
Point to point protocol.
-an authentication standard where 2 devices connect, authenticate with name/password, negotiate network protocol.
-RFC 1661: defines how PPP works.