Cryptography & Encryption I Flashcards
A simple, lightweight file transfer protocol that is often used for transferring small files over a network. Unlike FTP, this protocol does not provide authentication or encryption.
Example: Works over UDP
Trivial File Transfer Protocol (TFTP)
A secure version of the FTP protocol, designed to transfer files over a secure SSH connection. It ensures that both the commands and data are encrypted.
Secure File Transfer Protocol (SFTP)
An old, unencrypted network protocol used to remotely access and manage network devices or servers via a command-line interface. It is considered insecure due to the lack of encryption.
Telnet
An extension of the standard FTP protocol that adds SSL/TLS encryption to protect data during file transfers. Unlike SFTP, this relies on FTP over an encrypted channel.
File Transfer Protocol Secure (FTPS)
A standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments such as images, audio, video, and application files.
Key Note: Allows emails to include attachments
Multipurpose Internet Mail Extensions (MIME)
An extension of MIME that adds security features like encryption and digital signatures to email messages, ensuring the confidentiality, integrity, and authenticity of the email content.
Key Note: Uses X.509 Certificates
Secure/Multipurpose Internet Mail Extensions (S/MIME)
A communication protocol used in computer networks for sending data without establishing a connection. It is part of the Transport Layer in the OSI model and operates in a connectionless manner, meaning it doesn’t guarantee delivery or order of packets.
Key Note: used in real-time applications where speed is crucial, and minor data loss is acceptable (e.g., VoIP, video streaming, DNS).
User Datagram Protocol (UDP)
A widely used standard for digital certificates that authenticate the identity of individuals, devices, or services in a network. They are commonly used in public key infrastructure (PKI) systems to verify that a public key belongs to the entity it claims to represent.
X.509 Certificates
A protocol developed by Microsoft that allows users to remotely access and control a computer’s desktop over a network. It provides a graphical interface for users to interact with a remote computer.
Remote Desktop Protocol (RDP)
A network protocol used to securely transfer files between computers over a secure SSH (Secure Shell) connection. It is widely used for transferring files in a secure manner across a network.
Secure Copy Protocol (SCP)
A suite of protocols used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet in a communication session.
Internet Protocol Security (IPsec)
A secure connection over the internet that allows users to send and receive data as if they were directly connected to a private network. It encrypts internet traffic, ensuring privacy and security.
Virtual Private Network (VPN)
A database used in networking devices (such as routers or firewalls) to define the security policies for traffic. It is a critical component of IPsec (Internet Protocol Security) implementations and is used to determine how traffic should be encrypted or authenticated.
Security Policy Database (SPD)
A property of secure communication protocols that ensures session keys are not compromised even if the server’s private key is compromised in the future. In other words, each session key is independent and not derived from any long-term keys.
Example: Strengthens the security of session keys.
Perfect Forward Secrecy (PFS)
A protocol used in IPsec to provide authentication and integrity for IP packets. It ensures that the data within an IP packet has not been altered during transmission and authenticates the source of the packet.
Authentication Header (AH)
A protocol used in IPsec to provide confidentiality, data integrity, and authentication for IP packets. Unlike AH, this feature provides encryption for the data payload in addition to authentication.
Provides Confidentiality, Integrity, and Authentication (CIA)
Encapsulating Security Payload (ESP)
A type of wireless network that provides mobile broadband access over a large geographical area, such as a city, country, or even globally. This is often used by mobile devices like smartphones, tablets, and laptops to access the internet via cellular networks (e.g., 4G, 5G).
Wireless Wide Area Network (WWAN)
A small, localized network typically used for connecting personal devices, such as smartphones, laptops, and wearables, over short distances (usually within a range of a few meters).
Personal Area Network (PAN)
A logical grouping of devices within a physical network, allowing network segmentation and isolation of traffic even if the devices are on different physical locations. These help improve security, performance, and management of network traffic.
Virtual Local Area Network (VLAN)
A network protocol used for delivering audio and video over IP networks in real-time. It is commonly used in VoIP (Voice over IP) communications, video conferencing, and streaming media.
Real Time Protocol (RTP)
A signaling protocol used to initiate, maintain, and terminate communication sessions, such as voice and video calls, over IP networks. This protocol is widely used in VoIP applications.
Session Initiation Protocol (SIP)