Secure Communications Protocol Flashcards
IPsec - What is Public Key Cryptopgraphy used for?
Encryption, Access Control, Non Repudiation, message authentication
IPsec - What is the primary use of IPsec
VPN
IPsec - In which modes can IPsec operate?
Transport or tunnel mode
Kerberos - What solution does it offer?
Single Sign On (SSO)
Kerberos - What is protected?
Logon credentials
What do modern implementations of Kerberos use?
Hybrid encryption to provide reliable authentication protection
What kind of technique/encryption is SSH?
End to end encryption technique
What is SSH used for?
encryption of plaintext (rcp, rlogin, rexec); protocol encryption (such as with SFTP); VPN
What does Signal protocol provide?
End to end encryption for voice communication, videoconferencing, text message services
What is S-RPC (Secure Remote Procedure Call) and what is it used for?
authentication service;
prevention of unauthorized execution of code on remote systems
What is SSL (Secure Sockets Layer) and what is it used for?
encryption protocol developed by Netscape;
to protect communications between web server and web browser
What kind of traffic can be secured by SSL?
web, email, File transfer protocol (FTP), telnet
SSL is a “….”-oriented protocol
session-oriented
What does SSL provide related to CIA?
confidentiality + integrity
SSL Key size
40 bits or 128 bits
SSL is superseded by “…”
Transport Layer Security (TLS)
Advantage of using TLS instead of SSL
stronger authentication and encryption protocols
SSL/TLS protects against which type of attacks?
tampering, spoofing, eavesdropping
Features of SSL/TLS
- secure client server communication in insecure network
- one way authentication
- two way authentication (digital certs)
- initial payload of TCP package –> encapsulation of all higher layer protocol payloads
- can be implemented at lower layers to operate as VPN (OpenVPN)
- can be used to encrypt UDP + SIP connections; SIP = protocol for VoIP