network security Flashcards
symmetric encryption
sender and receiver uses same key to encrypt and decrypt a message
DES
DATA ENCRYPTION STANDARD
56 BIT ENCRYPTION KEY
TRIPLE DES
USES 3 56 BIT KEYS..
ENCYPT-> DECRYPT->ENCRYPT
AES
ADVANCED ENCRYPTION STANDARD
128 BIT 192 BIT AND 256 BIT KEYS
1000X FASTER THEN DES
ASYMMETRIC ENCRYPTION
SENDER AND RECIEVER ISE DIFFERENT KEYS TO ENCRYPT AND DECRYPT A MESSAGE….
LOCK, KEY, AND PW TO PROTECT A KEY
LOCK IS SENT TO FRIENDS,
THEY SEND HER MESSAGES WITH HER LOCK,
SHE UNLOCKS HER KEY WITH HER PW.
SHE USES HER KEY TO OPEN HER LOCK TO READ THE MESSAGES,
PKI
PUBLIC KEY INFRASTRUCTURE
INTEGRITY
ENSURES DATA WAS NOT MODIFIED IN TRANSIT AND VERIFIES IT CAME FROM THE ORIGINAL SOURCE
HASHING
MAINTAIN INTERGRITY
RUNS A STRING OF DATA THROUGH AN ALGORITHM, CREATING A HASH THAT SERVES AS A UNIQUE INDIVIDUAL FINGERPRINT FOR A FILE OR DATA SET.
MD5
128BIT - HASH
SHA-256
256BIT - HASH
CRAM-MD5
MD5 VARIANT USED IN EMAIL SYSTEMS - HASH
PSK
Pre-Shared Key
security authentication where the same password or key being used on both the wireless access point and any connecting client devices to gain access to the network
802.1x
Most widely used enterprise grade authentication method
own username and password
WEP
Wired Equivalent Privacy —BAD
Never Use it
PSK- Static 40 bit key
WPA
Wifi Protected access
TKIP 48bit + RC