Term
|
Definition
Many Apps use their own encryption. standards include SSL/TLS |
|
|
Term
|
Definition
Not a common layer for encryption |
|
|
Term
|
Definition
Not a common layer for encryption |
|
|
Term
|
Definition
Neither TCP not UDP offer any encryption, little encryption happens here |
|
|
Term
|
Definition
IPSec via software that encrypts enterything inside an IP packet but the IP Addy and a few other fields |
|
|
Term
|
Definition
A common place for encryption using proprietary encryption devices. they scramble all data in Ethernet frames except MAC address info. encoded and decoded on the fly. |
|
|
Term
|
Definition
No Common encryption done on this layer |
|
|
Term
how Public Key cryptography works |
|
Definition
1-receiver creates 2 keys(pub-k offered to sender, private-k kept secret) 2-pub key sent to sender 3-sender encrypts message with pub-k. 4-encrypted message sent to receiver. 5-receiver decrypts message with private-k (!Non-repudiation!) |
|
|
Term
|
Definition
Rivest Shamir Adleman: Diffie-Helman Key Exchange improved upon - fully functional algorithm - enables secure digital signatures |
|
|
Term
|
Definition
Diffie-Hellman Key Exchange - introduced by whitfield Diffie, Martin Hellman, & Ralph Merke in the late 70's - Asymmetric-key Algorithm |
|
|
Term
|
Definition
encrypted data in single "chunks" |
|
|
Term
|
Definition
takes a single bit at a time and encodes on-the-fly |
|
|
Term
|
Definition
Data Encryption Standard: by US gov late 70's - 64-bit blocks - 56-bit key - susceptible to brute force - evolved into 3DES, IDEA(International), and Blowfish |
|
|
Term
|
Definition
Rivest Cipher 4: developed by Ron Rivest late 80's - stream cipher - still used but can fall to successful attacks |
|
|
Term
|
Definition
Advanced Encryption Standard: Late 90's - 128-bit block - 128-, 192-, or 256-bit key - secure, practically uncrackable (for now) - able to sometimes compete with stream cipher |
|
|
Term
|
Definition
Secure Socket Layer: combines digital certificates and RSA - server driven - HTTPS need SSL certificate |
|
|
Term
|
Definition
1-request made by client for server's pub-key and cert. 2-request sent to client. 3-encryption level negotiated. 4-session key generated by client using server's pub-key. 5-session key used for data encryption |
|
|
Term
|
Definition
Transport Layer Security: similar to SSL, but not compatible |
|
|