The internet - Internet security Flashcards
Explain what the key exchange problem is, in relation to a symmetric cipher
- How to pass the key (from the sender) to the receiver;
- Without it being intercepted / securely;
Explain what it means for a cipher to be described as being computationally secure
The cipher cannot be cracked, by any known method in a polynomial amount of time
what is a TCP/IP protocol
a stack set of protocols used in turn, to format a message so it can be sent over a network
- each layer provides a specific function within the transmission of the message
layers of the TCP/IP
- application layer
- transport layer
- network layer
- link layer
summarise the application layer
- at the top of the stack
- uses protocols relating to the application being used to transmit data over a network, usually the Internet
- eg SMTP,HTTP
summarise the transport layer
- second layer
- uses the TCP to establish an end to end connection with the recipient computer
- splits data into packets, numbers them sequentially
- adds a port number
- performs error detection
- any missing packets are requested to be resent
what does TCP/IP stand for
transmission control protocol/internet protocol
summarise the network layer
- adds the IP addresses of the source and destination
- router uses IP addresses to forward the packets on to the destination
- the addition of an IP address to the port number forms a socket
- each router uses a routing table to instruct the next hop
summarise the link layer
- last layer
- physical connection between network nodes
- adds the MAC addresses, identifying the NIC of the source and destination devices
- MAC addresses change with each hop
how is data received after tcp/ip
- link layer removes mac address from each packet
- passes it to network layer
- network layer removes IP address from each packet, passes it to transport layer
- transport layer removes removes the port number from each packet, reassembles the packet in the correct order
- passes it to app layer
- app layer presents the image data for the user in a brpwser
features of a mac address
uniquely identifies a physical device with an NIC (NETWORK INTERFACE CARD)
- may be the destination computer or a router
-packets move around the lower layers of the stack as they hop across routers, changing their mac address as they go
well known ports
20 = file transfer protocol
80 and 8080 = HTTP
443 = HTTPS(encrypted HTTP)
25 = SMTP (simple mail transfer protocol)
what is a port
a port determines which application must deal with a data packet as it enters your computer