Cryptography Applications Flashcards
VPN
Virtual Private Network
A mechanism that allows you to remotely connect a host or network to an internal, private network, passing the data over a public channel, like the Ethernet
Tunnel
The tunnel is provided by L2TP which permits the passing of unmodified packets from one network to another
Secure channel
The secure channel is provided by IPsec, which provides confidentiality, integrity and authentication of data being passed.
TPM
Trusted Platform Module:
- secures generation of keys
- random number generation
- remote attestation
- data binding and sealing
A TPM had unique secret RSA key burned into the hardware at the time of manufacture, which allows a TPM to perform things like hardware authentication. This can detect unauthorized hardware changed to a system
Secure element
A temper resistant chip often embedded in the microprocessor or integrated into the main board of a mobile device.
It supplies secure storage of cryptographic keys and provides a secure environment for applications
TEE
Trusted Execution Environment
Provides a full-blown isolated execution environment that runs alongside the main os