Lesson 15 Flashcards
Symmetric-key Cryptography
Also known as:
secret key or symmetric key encryption.
Modern symmetric ciphers are known as ________because they involve multiple rounds where each round is made up of simple ciphers
round ciphers
_________ divide plaintext into blocks and use the same key for encryption and decryption.
Block ciphers
Three modern symmetric key ciphers are
DES, 3DES, AES
asymmetric key encryption
also known as
Public/private key encryption
Diffie - Hellman is a ___________ used to encrypt and decrypt ___________ over a public channel between two parties that have no prior knowledge of each other and was one of the first public - key protocols.
public - key cryptosystem
symmetric keys
The _________ algorithm generates persistent asymmetric keys that can be used for encryption, digital signatures, and so on.
RSA Signature
cryptographic hash
AKA
To get authentication and non - repudiation, (and data integrity),
Hash Algorithms
MD5, SHA-1 and 2
IPsec Protocols
ESP and AH
Five Steps of IPsec
Interesting traffic:
IKE Phase 1: negotiate an IKE security policy (Secure channel)
IKE Phase 2: negotiate an IPsec security policy (Secure data)
Data Transfer
Tunnel terminated
An __ is simply the bundle of algorithms and parameters that is being used to encrypt and authenticate a particular flow in one direction. Therefore, in normal bi - directional traffic, the flows are secured by a pair of security associations.
Security Associations (SA)