Securing TCP/IP Flashcards
Integrity
Process that Guarantees that the data received is the same as originally sent.
Nonrepudiation
A person cannot deny he or she took a specific action
Authentication
Verify that whoever is trying to access the data is the person you want accessing it.
Authorization
What an authenticated person can do with the data.
Ciphertext
When you run cleartext through a cipher algorithm using a key.
Symmetric Key Algorithm
When you use the same key to encrypt and decrypt the encryption
Asymmetric Key Algorithm
When you use different keys for encrypting and decrypting
Block Ciphers
Encrypt data in chunks of a certain length at a time
DES
Data Encryption Standard
DES Definition
used 64 bit block and 56 bit key. Outdated form of block cipher.
Stream Sipher
Takes a single bit at a time and encrypts on the fly.
RC4
Rivest Cipher 4 - very fast stream cipher that was used mostly in wireless. Stopped being used around 2013 due to weakness.
AES
Advanced Encryption Standard
AES definition
Used by almost all TCP/IP applications and is a block cipher that uses 128bit block size and 128, 192, or 256 bit key size.
Public Key Cryptography
Primary Asymmetric implementation of security, most common in RSA
Integrity Hash Function
mathematical function that you ru n on a string of binary digits of any length that results in a value of some fixed length.
File Hashing
Hashing the contents of a file
MD5
Message Digest Algorithm version 5, creates a 128 bit message digest
SHA
Secure Has Algorithm is the primary family of cryptographic hash functions
SHA 224
SHA-2 with a 224 bit message digest