Securing TCP/IP Flashcards
5 areas of TCP/IP Security
Encryption - scramble, mix up or change data
Integrity - data is received is the same as data sent
nonrepudiation - person can not deny they took a specific action
authentication - verify person accessing data
authroization - what can authorized person do with data
symmetric-key algorithm
same key for both encryption and decryption
asymmetric-key algorithm
different key for encryption and decryption
block cipehers
name of most symmetric key algorithms
- encrypt chunks of data of a certain length at a time
DES
Data Encryption Standard
64 bit block
56 bit key
susceptible to brute-force attacks
stream ciphers
takes a single bit and encrypts it on the fly
RC4
Rivest Cipher 4
- fast easy to use and free
- stream cipher
AES
Advanced Encryption Standards
- block cipher
- 128, 192 or 256 bit key size
public-key cryptography
primary asymmetric key algorithm
encryption at each layer
1 - no encryption at this layer except bigger WAN tech like SONET
2 - no encryption done at this layer
3 - only IPSec, typically software that encrypts the IP packet, new outer layer encapsulates and encrypts inner packet
4 - neither TCP or UDP offers any encryption
5, 6, 7 - important encryption standards such as SSL and TSL
hash
mathmatical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)
cyptographic hash
- one way function
- hash is irreversible
- can be used to verify file integrity
md5
message-digest algorithm version 5
- 128-bit message digest
SHA
secure hash algorithm
- includes sha-1, sha-2, and sha-3
- sha-1 produces 160-bit message digest
- sha-2 has four variants
- sha-224 (224 bit message digest)
- sha-256
- sha-384
- sha-512
- sha-3 comes in 4 variants
- sha3-224
- sha3-256
- sha3-384
- sha3-512
CRAM-MD5
tool for server authentication
digital signature
a hash of the public key encrypted by the private key
certificate
standardized type of file that includes a public key with a digital signatuure, and the digital signature of a trusted 3rd party
NAC
Network Access Control
- usually prevents computers lacking anti-malware and patches from accessing the network
- creates policies that define what individiual systems can do on the network