Securing TCP/IP Flashcards
Process of guaranteeing that someone can’t deny that they sent a message; message can be traced back to the sender
nonrepudiation
Encryption using the same key for the encryption and decryption
symmetric-key algorithm
Encryption using different keys for the encryption and decryption
asymmetric-key algorithm
Grandaddy of all symmetric-key algorithms, it used a 64-bit block and 56-bit key for encryption; susceptible to brute force
Data Encryption Standard (DES)
Symmetric algorithm in which data is encrypted in discrete chunks of a certain length
block cipher
Symmetric algorithm in which data is encrypted one bit at a time; quick and popular with older wireless network or cell phones
stream cipher
Popular stream cipher that was fast, easy to use, and free; considered a legacy cipher due to found weaknesses
Rivest Cipher 4 (RC4)
Symmetric algorithm that uses a 128-bit block size and a 128-, 192-, or 256-bit key for encryption; most popular symmetric algorithm
Advanced Encryption Standard (AES)
Primary asymmetric implementation where one user keeps a private key to himself and send a public key to another; data is encrypted using the public key, the decrypted later using the private key; today, this is done by encrypting and decrypting a symmetric key
public-key cryptography
system used by most asymmetric cryptographic implementations
RSA (Rivest, Shamir, and Adleman)
First commonly used hash, which resulted in a 128-bit message digest
Message-Digest Algorithm version 5 (MD5)
The primary family of cryptographic has functions used these days, which includes 3 different versions (version 1 no longer used, version 2 is most popular right now)
Secure Hash Algorithm (SHA)
A special form of MD5 used by SMTP servers, it is used as a tool for server authentication
Challenge-Response Authentication Mechanism-Message Digest 5 (CRAM-MD5)
Organization/tree of certificate authorities; sometimes consists of root CA’s, intermediate CA’s, and issuing CA’s
public-key infrastructure (PKI)
A newer series of protection applications that combine features previously done my multiple applications; these prevent computers lacking anti-malware and patches from accessing the network and create policies for what systems can do on a network
Network Access Control (NAC)