Cryptography Applications Flashcards

1
Q

VPN

A

Virtual Private Network

A mechanism that allows you to remotely connect a host or network to an internal, private network, passing the data over a public channel, like the Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tunnel

A

The tunnel is provided by L2TP which permits the passing of unmodified packets from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure channel

A

The secure channel is provided by IPsec, which provides confidentiality, integrity and authentication of data being passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPM

A

Trusted Platform Module:
- secures generation of keys
- random number generation
- remote attestation
- data binding and sealing

A TPM had unique secret RSA key burned into the hardware at the time of manufacture, which allows a TPM to perform things like hardware authentication. This can detect unauthorized hardware changed to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure element

A

A temper resistant chip often embedded in the microprocessor or integrated into the main board of a mobile device.

It supplies secure storage of cryptographic keys and provides a secure environment for applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TEE

A

Trusted Execution Environment

Provides a full-blown isolated execution environment that runs alongside the main os

How well did you know this?
1
Not at all
2
3
4
5
Perfectly