Chapter 11 - Securing TCP/IP Flashcards
What are the five areas of focus in TCP/IP security
Encryption Integrity Nonrepudiation Authentication Authorization
Define ‘ecryption’ in terms of TCP/IP security
To scramble, mix up, or change data
Must be easily descrambled by destination host
Define ‘integrity’ in terms of TCP/IP security
The process that guarantees that the data received is the same as originally sent.
Define ‘nonrepudiation’ in terms of TCP/IP security
process of making sure data came from the person or entity it was supposed to come from
Define ‘authentication’ in terms of TCP/IP security
to verify that whoever is trying to access the data is the person you want access the data
Define ‘authorization’ in terms of TCP/IP security
defines what an authenticated person can do with that data
How does all data start
plain text
clear text
Binary file (photograph)
Define ‘cipher’
a general term for a way to encrypt data
Define ‘unicode’
numbers representing letters and other characters
What is the purpose of a key in cryptography
A key does some math to every value using an algorithm. It enables us to scramble and unscramble data
Define frequency analysis
certain letters of the alphabet are used more than others, this helps to decrypt the code
Define symmetric-key algorithm
the same key is used for encryption and decryption
Major downfall is if someone gets a hold of the key they can encrypt or decrypt with it
Define asymmectric algorithm
uses different keys for encryption and decryption
Why use a block cipher
they can encrypt data in single ‘chunks’ of x length at a time
ex: 128-bit chunks
Works well when data comes in clearly distinct chunks
IP packets are ideal for this encryption method
Define DES
Data Encryption Standard uses a 64-bit block and a 56 bit key.
- Susceptible to brute force
what are 3 examples of ecryption that proceeded DES
3DES
International Data Encryption Algorithm (IDEA)
Blowfish
Define Stream Cipher
It takes a single bit at a time and encrypts it on the fly
+ Popular for long streams of data
ex. RC4
What is RC4
Rivest Cipher 4 \+ Fast \+ Easy to use \+ Free - Legacy
What is AES
Advanced Encryption Standard
- Block Cipher: 128 bit block & 128/192/256 key
+ Fast
+ Encompases many areas (wireless to file encryption)
What is Public Key Cryptography
most popular
Keys are exchanged securely
Public keys are used for encryption and decryption
What kind of encryption is seen at each layer of the OSI model
Layer 1: no encryption Layer 2: Proprietary encryption Layer 3: IPsec Layer 4: no encryption Layer 5/6/7: All the important encryption standards
What is a hash and its use
A cryptographic function that runs a string of binary digits and results in a value of some fixed length
aka checksum or message digest
Define SHA
Secure Hash Algorithm is the primary family of hash functions.
SHA-1 ( No longer safe)
SHA-2…
SHA-256 (most popular)
If MD5 is considered secure why is it still used in SMTP
Use a special form of MD5 called Challenge-Response authentication mechanism message digest 5
What is a digital signature
A hash of the message encrypted by the private key
How are public keys used
matching public keys decrypt digital signature public key, generate their own hash, and compares it to encrypted hash