Encryption Flashcards
What is Symmetric and Asymmetric Encryption?
In symmetric encryption, a single key is used both to encrypt and decrypt traffic. It is also referred as shared key or shared secret encryption. Symmetric encryption algorithms include DES, 3DES, AES.
In Asymmetric encryption two keys are used to encrypt and decrypt traffic, one for encryption and one for decryption. The most common asymmetric encryption algorithm is RSA.
Define Digital Signatures?
Digital signature is an attachment to an electronic message used for security purposes. It is used to verify the authenticity of the sender.
What are the 3 protocols used in IPSec?
- Authentication Header (AH).
- Encapsulating Security Payload (ESP).
- Internet Key Exchange (IKE).
Explain IPsec Protocol Headers?
1.<u>Encapsulating Security Payload (ESP) - It is an IP-based protocol which uses Protocol 50 in the IP header. ESP is used to protect the confidentiality, integrity and authenticity of the data and offers anti-replay protection.
Drawback - ESP does not provide protection to the outer IP Header</u>
- Authentication Header (AH) - It is also an IP-based protocol that uses Protocol 51in the IP header. AH is used to protect the integrity and authenticity of the data and offers anti-replay protection.
Unlike ESP, AH provides protection to the IP header also.
Drawback - AH does not provide confidentiality protection.</u>
How ESP & AH provides anti-replay protection?
Both ESP and AH protocols provide an anti-reply protection based on sequence numbers. The sender increments the sequence number after each transmission, and the receiver checks the sequence number and reject the packet if it is out of sequence.
At what layer IPsec works?
IPsec secures IP traffic at the Layer 3 (Network Layer) of the OSI model.
Name a major drawback of IPSec?
IPSec only supports unicast IP traffic.
What is IPSec VPN?
IP Security Protocol VPN means VPN over IP Security. It allows two or more users to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session. IPsec provides data confidentiality, data integrity and data authentication between participating peers.
What is Authentication, Confidentiality Integrity?
Authentication - Verifies that the packet received is actually from the claimed sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication.
Integrity - Ensures that the contents of the packet has not been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA.
Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES (Triple-DES), AES (Advanced Encryption Standard).
At what protocol does IKE works?
IKE uses UDP port 500.
Where does the ESP header go in relation to the IP header?
The ESP header is inserted after the IP header and before the next layer protocol header (transport mode) or before an encapsulated IP header (tunnel mode).
Describe Tunnel mode
IPSec tunnel mode is thedefault mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).
Tunnel modeis most commonly used between gateways (Cisco routers or ASA firewalls), or at an end-station to a gateway, the gateway acting as a proxy for the hosts behind it.
Tunnel mode is used to encrypt traffic between secure IPSec Gateways, for example two Cisco routers connected over the Internet via IPSec VPN.
Describe ESP vs AH Protocols
In tunnel mode, an IPSec header (AHorESP header) is inserted between the IP header and the upper layer protocol. Between AH and ESP, ESP is most commonly used in IPSec VPN Tunnel configuration.
How is ESP distinguished in the IP header?
ESP is identified in theNew IP headerwith an IPprotocol IDof 50.
How is AH distinguished in the IP header?
AH is identified in theNew IP headerwith an IPprotocol IDof51.