Cryptography Flashcards
Cleartext Protocols
Transmits data over the network without any kind of transformation (encryption). Should only be used on “trusted” networks.
Attack Landscape: Easy to eavesdrop on, intercept, or modify
Cryptographic Protocols
Transform (encrypt) the information transmitted to protect communication. There are many goals of these protocols but one is to prevent eavesdropping.
What should you do if you need to run a clear-text protocol on an untrusted network?
You can wrap (tunnel) a clear-text protocol in a cryptographic one.
Example: VPN - protocol tunneling
Virtual Private Network (VPN)
Uses Cryptography to extend a private network over a public one, like the internet.
The extension is made by performing a protected connection a private network. From the client point of view, being in the VPN is the same as being directly connected to the private network.