Podcast
Questions and Answers
In information security, what does integrity primarily ensure?
In information security, what does integrity primarily ensure?
- Information is accessible to authorized entities when needed.
- Information is efficiently stored and retrieved.
- Information is hidden from unauthorized access.
- Information is protected from unauthorized modification. (correct)
Which of the following attacks primarily threatens the availability of information?
Which of the following attacks primarily threatens the availability of information?
- Denial of service (correct)
- Traffic analysis
- Snooping
- Masquerading
Which technique focuses on concealing the existence of a message rather than its contents?
Which technique focuses on concealing the existence of a message rather than its contents?
- Encipherment
- Steganography (correct)
- Hashing
- Cryptography
What is a key characteristic of symmetric-key ciphers?
What is a key characteristic of symmetric-key ciphers?
In cryptography, what is the function of a 'nonce' in challenge-response authentication?
In cryptography, what is the function of a 'nonce' in challenge-response authentication?
Which security goal is most directly achieved through the use of ciphers?
Which security goal is most directly achieved through the use of ciphers?
What is the primary purpose of a message digest?
What is the primary purpose of a message digest?
How does a digital signature differ from a message authentication code (MAC)?
How does a digital signature differ from a message authentication code (MAC)?
What is the main function of a Key Distribution Center (KDC)?
What is the main function of a Key Distribution Center (KDC)?
During key generation in RSA, what is the purpose of the modulus n?
During key generation in RSA, what is the purpose of the modulus n?
Which of the following is a key objective of entity authentication?
Which of the following is a key objective of entity authentication?
In network security, what primary role does a firewall serve?
In network security, what primary role does a firewall serve?
Which of the following is a characteristic of a packet-filter firewall?
Which of the following is a characteristic of a packet-filter firewall?
What is the purpose of the Internet Key Exchange (IKE) protocol?
What is the purpose of the Internet Key Exchange (IKE) protocol?
Which protocol primarily provides security at the transport layer?
Which protocol primarily provides security at the transport layer?
What does a 'cipher suite' define in the context of SSL?
What does a 'cipher suite' define in the context of SSL?
Which three security services can a digital signature directly provide?
Which three security services can a digital signature directly provide?
Which feature is unique to ESP (Encapsulating Security Payload) compared to AH (Authentication Header) in IPSec?
Which feature is unique to ESP (Encapsulating Security Payload) compared to AH (Authentication Header) in IPSec?
What is the purpose of 'key rings' in Pretty Good Privacy (PGP)?
What is the purpose of 'key rings' in Pretty Good Privacy (PGP)?
What is Virtual Private Network (VPN) primarily used for?
What is Virtual Private Network (VPN) primarily used for?
In what mode does IPSec protect the entire IP packet, including the header?
In what mode does IPSec protect the entire IP packet, including the header?
What is the primary role of the Handshake Protocol in SSL/TLS?
What is the primary role of the Handshake Protocol in SSL/TLS?
What is the purpose of the Change Cipher Spec protocol?
What is the purpose of the Change Cipher Spec protocol?
Which of the following distinguishes S/MIME from PGP regarding certificate authorities?
Which of the following distinguishes S/MIME from PGP regarding certificate authorities?
Which statement best describes how Pretty Good Privacy (PGP) secures email?
Which statement best describes how Pretty Good Privacy (PGP) secures email?
Refer to the topology used in PGP, what kind of entity is Luise?
Refer to the topology used in PGP, what kind of entity is Luise?
An organization needs to ensure secure communication between its branches over the internet. Which technology would be the most appropriate to implement?
An organization needs to ensure secure communication between its branches over the internet. Which technology would be the most appropriate to implement?
In the context of information transmission, what is the best description for why steganography might be chosen over cryptography?
In the context of information transmission, what is the best description for why steganography might be chosen over cryptography?
There is a shared key between Alice and Bob. Alice sends Bob an encrypted message and also generates a Message Authentication Code (MAC). What does the use of the MAC achieve?
There is a shared key between Alice and Bob. Alice sends Bob an encrypted message and also generates a Message Authentication Code (MAC). What does the use of the MAC achieve?
When is asymmetric-key cryptography more efficient than symmetric-key cryptography?
When is asymmetric-key cryptography more efficient than symmetric-key cryptography?
What should be the ideal ideal for a 309-digit RSA exponent?
What should be the ideal ideal for a 309-digit RSA exponent?
If Alice wants to send message to N people, how many keys are needed?
If Alice wants to send message to N people, how many keys are needed?
What are the 2 protocols defined by IPCsec to provide authentication and/or encryption for packets at the IP level?
What are the 2 protocols defined by IPCsec to provide authentication and/or encryption for packets at the IP level?
What does a Security Policy Database determine for packets?
What does a Security Policy Database determine for packets?
Given the goals of security, Confidentiality, Integrity, and Availability, which goal applies to changes made by an authorized entity?
Given the goals of security, Confidentiality, Integrity, and Availability, which goal applies to changes made by an authorized entity?
In the context of cryptography, what is the significance of modulo 26?
In the context of cryptography, what is the significance of modulo 26?
Under what conditions is the One-Time Pad (OTP) encryption method considered completely secure?
Under what conditions is the One-Time Pad (OTP) encryption method considered completely secure?
What is the primary component used to preserve the integity of a document
What is the primary component used to preserve the integity of a document
What is an advantage for using steganography instead of cryptography
What is an advantage for using steganography instead of cryptography
What is correct asymmetric protocol?
What is correct asymmetric protocol?
What is an advantage a symmetric-key algorithm has over an asymmetric-key algorithm
What is an advantage a symmetric-key algorithm has over an asymmetric-key algorithm
What has to be determined in order to figure out if the IPSec provides proper access control indirectly?
What has to be determined in order to figure out if the IPSec provides proper access control indirectly?
With digital signatures, what aspect can directly provide the last three regarding several security services (message confidentiality, message authentication, message integrity, and non-repudiation)?
With digital signatures, what aspect can directly provide the last three regarding several security services (message confidentiality, message authentication, message integrity, and non-repudiation)?
What security services does the Authenticating Header (AH) provide in IPSec?
What security services does the Authenticating Header (AH) provide in IPSec?
If 𝑁 number of members require communication with each other, how many keys are required when two people use two keys for bidirectional communication?
If 𝑁 number of members require communication with each other, how many keys are required when two people use two keys for bidirectional communication?
Within IPSec, if confidentiality is needed for one should choose?
Within IPSec, if confidentiality is needed for one should choose?
Assuming the roles Alice and Bob are using the Diffie-Hellman key exchange, what conditions are required in order to implement?
Assuming the roles Alice and Bob are using the Diffie-Hellman key exchange, what conditions are required in order to implement?
Which of the following is an example of an attack that threatens confidentiality?
Which of the following is an example of an attack that threatens confidentiality?
In the context of security attacks, what does 'masquerading' primarily threaten?
In the context of security attacks, what does 'masquerading' primarily threaten?
Which of the following best describes the purpose of steganography?
Which of the following best describes the purpose of steganography?
In a symmetric-key cipher, if Alice and Bob wish to communicate, what must they do?
In a symmetric-key cipher, if Alice and Bob wish to communicate, what must they do?
In cryptography, what is the Caesar cipher an example of?
In cryptography, what is the Caesar cipher an example of?
What is a primary characteristic of a transposition cipher?
What is a primary characteristic of a transposition cipher?
How do modern ciphers differ from traditional ciphers in terms of data handling?
How do modern ciphers differ from traditional ciphers in terms of data handling?
What is a fundamental difference between a block cipher and a stream cipher?
What is a fundamental difference between a block cipher and a stream cipher?
What is the purpose of the S-boxes in the DES (Data Encryption Standard) algorithm?
What is the purpose of the S-boxes in the DES (Data Encryption Standard) algorithm?
Why is it important for the S-boxes in DES to be non-linear?
Why is it important for the S-boxes in DES to be non-linear?
In the context of cryptography, what is the primary advantage of using asymmetric-key ciphers?
In the context of cryptography, what is the primary advantage of using asymmetric-key ciphers?
In RSA, what is the purpose of the public exponent e and the private exponent d?
In RSA, what is the purpose of the public exponent e and the private exponent d?
In RSA cryptography, which key is used to encrypt the plaintext message by the sender?
In RSA cryptography, which key is used to encrypt the plaintext message by the sender?
What is a message digest primarily used for?
What is a message digest primarily used for?
Which statement best describes the function of a cryptographic hash function?
Which statement best describes the function of a cryptographic hash function?
What is the main purpose of a Message Authentication Code (MAC)?
What is the main purpose of a Message Authentication Code (MAC)?
How does a digital signature provide non-repudiation?
How does a digital signature provide non-repudiation?
In digital signatures, what key is used to create the signature?
In digital signatures, what key is used to create the signature?
Which of the following best describes entity authentication?
Which of the following best describes entity authentication?
What is a 'nonce' primarily used for in authentication protocols?
What is a 'nonce' primarily used for in authentication protocols?
In what category of authentication does a password fall?
In what category of authentication does a password fall?
What is the main goal of key management in cryptography?
What is the main goal of key management in cryptography?
What is the main challenge associated with symmetric-key distribution?
What is the main challenge associated with symmetric-key distribution?
What is the purpose of a Key Distribution Center (KDC)?
What is the purpose of a Key Distribution Center (KDC)?
Which cryptographic scheme does Diffie-Hellman primarily address?
Which cryptographic scheme does Diffie-Hellman primarily address?
In the context of IPSec, what does 'transport mode' primarily protect?
In the context of IPSec, what does 'transport mode' primarily protect?
Which of the following describes the main function of IPSec's tunnel mode?
Which of the following describes the main function of IPSec's tunnel mode?
What is the role of the Security Policy Database (SPD) in IPSec?
What is the role of the Security Policy Database (SPD) in IPSec?
Which component is used by IKE?
Which component is used by IKE?
What is the main purpose of the Internet Key Exchange (IKE) protocol?
What is the main purpose of the Internet Key Exchange (IKE) protocol?
At which layer of the OSI model does SSL/TLS primarily operate?
At which layer of the OSI model does SSL/TLS primarily operate?
When establishing an SSL/TLS connection, what parameters are negotiated to define how the connection will be secured?
When establishing an SSL/TLS connection, what parameters are negotiated to define how the connection will be secured?
What is the purpose of the SSL/TLS Handshake Protocol?
What is the purpose of the SSL/TLS Handshake Protocol?
Within SSL/TLS, what action triggers the use of new cryptographic parameters?
Within SSL/TLS, what action triggers the use of new cryptographic parameters?
How is an email addressed to Bob encypted?
How is an email addressed to Bob encypted?
How does PGP primarily certify keys?
How does PGP primarily certify keys?
In PGP, what is the main purpose of 'key rings'?
In PGP, what is the main purpose of 'key rings'?
What does Mime stand for?
What does Mime stand for?
What is a packet filter firewall primarily designed to do?
What is a packet filter firewall primarily designed to do?
Proxy firewalls operate at which layer, compared to packet-filter?
Proxy firewalls operate at which layer, compared to packet-filter?
What is the primary advantage of a proxy firewall over a packet-filter firewall?
What is the primary advantage of a proxy firewall over a packet-filter firewall?
What is a critical requirement for information to maintain its integrity?
What is a critical requirement for information to maintain its integrity?
Which of the following attacks directly targets the integrity of a message by falsely claiming it is from a different user?
Which of the following attacks directly targets the integrity of a message by falsely claiming it is from a different user?
What distinguishes steganography from cryptography as a security technique?
What distinguishes steganography from cryptography as a security technique?
How does the use of symmetric-key ciphers affect communication security when only confidentiality is a concern?
How does the use of symmetric-key ciphers affect communication security when only confidentiality is a concern?
In the context of security, what is the purpose of 'Repudiation'?
In the context of security, what is the purpose of 'Repudiation'?
Consider Alice using RSA to send a confidential message to Bob. What key does Alice use to encrypt her message?
Consider Alice using RSA to send a confidential message to Bob. What key does Alice use to encrypt her message?
How do message digests contribute to data security, specifically in verifying the integrity of a transmitted file?
How do message digests contribute to data security, specifically in verifying the integrity of a transmitted file?
Which of the following characteristics distinguishes a digital signature from a simple Message Authentication Code (MAC)?
Which of the following characteristics distinguishes a digital signature from a simple Message Authentication Code (MAC)?
What is a primary challenge in symmetric-key distribution that Key Distribution Centers (KDCs) are designed to solve?
What is a primary challenge in symmetric-key distribution that Key Distribution Centers (KDCs) are designed to solve?
How does the Diffie-Hellman key exchange protocol establish a shared secret key over an insecure channel?
How does the Diffie-Hellman key exchange protocol establish a shared secret key over an insecure channel?
In the context of network security, what is the main goal of implementing IPSec?
In the context of network security, what is the main goal of implementing IPSec?
Consider the use of IPSec in 'transport mode.' What part of the IP packet is typically protected?
Consider the use of IPSec in 'transport mode.' What part of the IP packet is typically protected?
What defines the behavior of an IPSec connection determining whether a packet is protected by IPSec, bypassed, or dropped?
What defines the behavior of an IPSec connection determining whether a packet is protected by IPSec, bypassed, or dropped?
What is the primary function of the Internet Key Exchange (IKE) protocol in the context of IPSec?
What is the primary function of the Internet Key Exchange (IKE) protocol in the context of IPSec?
Why is the 'Change Cipher Spec' protocol important in SSL/TLS?
Why is the 'Change Cipher Spec' protocol important in SSL/TLS?
In PGP, how are keys typically certified to establish a 'web of trust'?
In PGP, how are keys typically certified to establish a 'web of trust'?
What is the main purpose of 'key rings' in PGP?
What is the main purpose of 'key rings' in PGP?
What distinguishes S/MIME's approach to certificate validation from PGP's?
What distinguishes S/MIME's approach to certificate validation from PGP's?
What best describes the role of a proxy firewall in network security?
What best describes the role of a proxy firewall in network security?
What is a significant difference in how proxy firewalls operate compared to packet-filter firewalls?
What is a significant difference in how proxy firewalls operate compared to packet-filter firewalls?
Flashcards
Confidentiality
Confidentiality
Hiding information from unauthorized access.
Integrity
Integrity
Protecting information from unauthorized changes.
Availability
Availability
Ensuring information is available to authorized entities when needed.
Security Attack
Security Attack
Signup and view all the flashcards
Snooping
Snooping
Signup and view all the flashcards
Traffic Analysis
Traffic Analysis
Signup and view all the flashcards
Modification Attack
Modification Attack
Signup and view all the flashcards
Masquerading Attack
Masquerading Attack
Signup and view all the flashcards
Replaying Attack
Replaying Attack
Signup and view all the flashcards
Repudiation Attack
Repudiation Attack
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Security Services
Security Services
Signup and view all the flashcards
Cryptography
Cryptography
Signup and view all the flashcards
Steganography
Steganography
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Symmetric-Key Cipher
Symmetric-Key Cipher
Signup and view all the flashcards
Substitution Cipher
Substitution Cipher
Signup and view all the flashcards
Transposition Cipher
Transposition Cipher
Signup and view all the flashcards
Block Cipher
Block Cipher
Signup and view all the flashcards
Stream Cipher
Stream Cipher
Signup and view all the flashcards
Bit-Level Encryption
Bit-Level Encryption
Signup and view all the flashcards
Additive Cipher
Additive Cipher
Signup and view all the flashcards
Monoalphabetic Subsitiution
Monoalphabetic Subsitiution
Signup and view all the flashcards
Autokey Cipher
Autokey Cipher
Signup and view all the flashcards
Transposition cipher
Transposition cipher
Signup and view all the flashcards
One-time Pad
One-time Pad
Signup and view all the flashcards
Asymmetric-Key Cipher
Asymmetric-Key Cipher
Signup and view all the flashcards
RSA Cryptosystem
RSA Cryptosystem
Signup and view all the flashcards
RSA Cryptosystem
RSA Cryptosystem
Signup and view all the flashcards
Message Integrity
Message Integrity
Signup and view all the flashcards
Message Digest
Message Digest
Signup and view all the flashcards
Cryptographic Hash Function
Cryptographic Hash Function
Signup and view all the flashcards
Message Authentication
Message Authentication
Signup and view all the flashcards
HMAC (Hashed MAC)
HMAC (Hashed MAC)
Signup and view all the flashcards
Digital Signature
Digital Signature
Signup and view all the flashcards
Comparaison
Comparaison
Signup and view all the flashcards
Process
Process
Signup and view all the flashcards
Services
Services
Signup and view all the flashcards
Digital Signatures
Digital Signatures
Signup and view all the flashcards
RSA Digital Signature
RSA Digital Signature
Signup and view all the flashcards
DSS
DSS
Signup and view all the flashcards
Entity Authentication
Entity Authentication
Signup and view all the flashcards
Message authentication
Message authentication
Signup and view all the flashcards
Verification Categories
Verification Categories
Signup and view all the flashcards
Passwords
Passwords
Signup and view all the flashcards
Challenge-Response
Challenge-Response
Signup and view all the flashcards
Key Management
Key Management
Signup and view all the flashcards
Symmetric-Key Distribution
Symmetric-Key Distribution
Signup and view all the flashcards
Exchange Confidential Messages
Exchange Confidential Messages
Signup and view all the flashcards
International KDC
International KDC
Signup and view all the flashcards
Symmetric-Key Agreement
Symmetric-Key Agreement
Signup and view all the flashcards
Public-Key distribution
Public-Key distribution
Signup and view all the flashcards
Network-Layer Security
Network-Layer Security
Signup and view all the flashcards
Transport Mode
Transport Mode
Signup and view all the flashcards
Host B
Host B
Signup and view all the flashcards
Tunnel Mode
Tunnel Mode
Signup and view all the flashcards
Tunnel Mode
Tunnel Mode
Signup and view all the flashcards
Services provided by IPSec
Services provided by IPSec
Signup and view all the flashcards
Security Association Database
Security Association Database
Signup and view all the flashcards
The Internet Key Exchange
The Internet Key Exchange
Signup and view all the flashcards
Virtual Private Network
Virtual Private Network
Signup and view all the flashcards
Transport-Layer Security
Transport-Layer Security
Signup and view all the flashcards
SSL Architecture
SSL Architecture
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Key Exchange Algorithms
Key Exchange Algorithms
Signup and view all the flashcards
Hash Algorithms
Hash Algorithms
Signup and view all the flashcards
Cipher Suite
Cipher Suite
Signup and view all the flashcards
Compression Algorithm
Compression Algorithm
Signup and view all the flashcards
Cryptographic Parameter Generation
Cryptographic Parameter Generation
Signup and view all the flashcards
Session
Session
Signup and view all the flashcards
Protocols
Protocols
Signup and view all the flashcards
Handshake Protocol
Handshake Protocol
Signup and view all the flashcards
Change cipher spec
Change cipher spec
Signup and view all the flashcards
Alert Protocols
Alert Protocols
Signup and view all the flashcards
Record Protocol
Record Protocol
Signup and view all the flashcards
13.6 APllICATION-LAYER SECURITY
13.6 APllICATION-LAYER SECURITY
Signup and view all the flashcards
E-mail Security
E-mail Security
Signup and view all the flashcards
Cryptographic Algorithms
Cryptographic Algorithms
Signup and view all the flashcards
E- mail security
E- mail security
Signup and view all the flashcards
Certificates
Certificates
Signup and view all the flashcards
PGP (Pretty Good Privacy)
PGP (Pretty Good Privacy)
Signup and view all the flashcards
Scenarios
Scenarios
Signup and view all the flashcards
Key Rings
Key Rings
Signup and view all the flashcards
PgP AlgorithmS
PgP AlgorithmS
Signup and view all the flashcards
PgP Certificate
PgP Certificate
Signup and view all the flashcards
PGP Packet
PGP Packet
Signup and view all the flashcards
Applications of Pgp
Applications of Pgp
Signup and view all the flashcards
Service Email System
Service Email System
Signup and view all the flashcards
Cryptographic Message Syntac
Cryptographic Message Syntac
Signup and view all the flashcards
Segmenatation
Segmenatation
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Packet Filter
Packet Filter
Signup and view all the flashcards
The packet and system
The packet and system
Signup and view all the flashcards
Study Notes
Introduction to Computer Network Security
- Information is a valuable asset requiring security measures to protect against attacks.
- Securing information involves confidentiality, integrity, and availability.
- Confidentiality: Hiding information from unauthorized access.
- Integrity: Protecting information from unauthorized modification.
- Availability: Ensuring information is accessible to authorized entities when needed.
Security Goals
- Confidentiality, integrity, and availability are key security goals.
Security Ataacks
- Security attacks threaten confidentiality through snooping and traffic analysis.
- Data integrity is threatened by modification, masquerading, replaying, and repudiation attacks.
- Availability is threatened by denial-of-service attacks.
Secuity Services and Techniques
- ITU-T defines security services for achieving security goals and preventing attacks.
- Implementing security involves techniques like cryptography and steganography.
- Cryptography is a general technique involving symmetric-key encipherment, asymmetric-key encipherment, and hashing.
- Steganography is a specific technique that focuses on covered writing, different from cryptography's "secret writing".
Confidentiality and Ciphers
- Confidentiality is achieved using ciphers divided into symmetric-key and asymmetric-key categories.
Symmetric-Key Ciphers
- A symmetric-key cipher uses the same key for encryption and decryption, enabling bidirectional communication.
- Traditional ciphers include substitution and transposition ciphers.
Modern Symmetric-Key Ciphers
- Modern symmetric-key ciphers are bit-oriented and can be block or stream ciphers.
- They address the need to encrypt numbers, graphics, audio, and video data, not just text.
- Using 8 or 16 bits per character increases the number of symbols and security.
Asymmetric-Key Ciphers
- Asymmetric-key ciphers complement symmetric-key, offering advantages that compensate for each other's disadvantages.
RSA Cryptosystem
- The RSA cryptosystem, named after Rivest, Shamir, and Adleman, is a common public-key algorithm.
- RSA uses two exponents, e (public) and d (private).
- Alice creates ciphertext C from plaintext P using: C = Pe mod n.
- Bob retrieves P using: P = Cd mod n.
- Modulus n, a large number, is created during key generation.
Other Aspects of Security
- Modern communication requires considering integrity, message/entity authentication, nonrepudiation, and key management in addition to confidentiality.
Message Integrity
- Message integrity ensures that a message remains unchanged.
Message and Message Digest
- Message integrity can be preserved using a fingerprint.
- A message digest is similar to a fingerprint, which can be compared to ensure it is the same.
Hash Functions
- Cryptographic hash functions produce a fixed-length message digest from a message of arbitrary length.
- Iteration is used, incorporating a fixed-size input function (compression function).
Message Authentication
- Including a secret shared between Alice and Bob that Eve doesn't possess during the process; we need to create a message authentication code (MAC).
Digital Signature vs HMAC
- A MAC uses a secret key to protect the digest, while a digital signature uses a pair of private-public keys.
Digital Signatures
- With digital signatures, the sender uses a signing algorithm; the receiver verifies using a verifying algorithm.
Security Services Through Digital Signatures
- Digital signatures provide message authentication, message integrity, and non-repudiation.
- Confidentiality still requires encryption/decryption.
RSA for Digital Signatures
- RSA can also be used for signing and verifying a message and is known as the RSA digital signature scheme.
- Only the sender's private and public keys are used, unlike during RSA encryption.
Entity Authentication
- Entity authentication is a technique where one party verifies the identity of another.
- The entity to be proven is the claimant; the verifying party is the verifier.
Types of Authetication
- The claimant must identify via something known, possessed, or inherent.
Passwords
- Password is the oldest method of entity authentication that is considered prone to attack.
Challenge-Response Authentication
- Challenge-response authentication involves proving knowledge of a secret without sending it. The verifier either possesses or retrieves the secret.
Key Management
- Secret keys must be handled and distributed with appropriate care.
- Public keys in asymmetric-key cryptography need to be handled in a similar fashion.
Symmetric-Key Distribution
- Symmetric-key cryptography requires a shared secret key between two parties and is more efficient than asymmetric-key methods for large messages.
- Exchanging confidential messages with N people requires N distinct keys.
- Two people are required to use two keys when communicating back and forth.
Public-Key Distribution
- People don’t need to share the same key as they do in symmetric approaches.
- Public keys are open and available to everyone to use.
Network-Layer Security
- Network-layer security is applied between hosts, routers, etc., to protect applications using the network layer.
IPSec Modes
- IPSec operates in transport or tunnel mode.
- Transport mode protects data delivered from the transport layer.
- Tunnel mode protects the entire IP packet by applying IPSec security methods to the entire packet then adds a new IP header.
IPSec Security Protocols
- IPSec defines the Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols for authentication for packets at the IP level.
Authentication Header (AH)
- Ensures the integrity of the payload, authenticates the origin of the packet; It uses a hash function and the secret key to create a message digest.
- AH doesn't provide confidentiality.
Encapsulating Security Payload (ESP)
- Provides source authentication, integrity, and confidentiality using both a header and a trailer.
AH and ESP for IPv4 and IPv6
- AH and ESP are part of the extension header for IPv6.
IPSec Provided Services
- AH and ESP protocols provide security services for packets at the network layer.
Services
- Access Control is provided by IPSec using a Security Association Database (SAD).
- Message integrity is preserved in AH and ESP.
- Entity authentication is possible via keyed-hash sent by the sender in both AH and ESP.
- AH doesn't provide confidentiality.
- Replay attacks are prevented through sequence numbers and a sliding receiver window in both protocols.
IPSec: Security Association
- Each IPSec header holds a sequence number when the association is made.
- When that number is maxed out, the association is deleted.
- Window size is fixed at receiver.
Internet Key Exchange (IKE)
- Designed to create inbound and outbound Security Associations as needed to send IP packets; consults the Security Policy Database (SPD).
Virtual Private Network (VPN)
- A virtual private network (VPN) has gained in popularity.
Transport-Layer Security
- It provides security for the application layer and uses the services of TCP or SCTP as a connection-oriented protocol.
- Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocol provide this security at the transport layer.
SSL Security
- SSL provides reliable transport layer protocol
- SSL architecture was developed to provides security and communication services for data from the application layer.
- Developed by Netscape
SSL - Services Provided
- Fragmentation
- Compression
- Message Integrity
- Confidentiality
- Framing
SSL: Four Protocols in Two Layers
- Defines four protocols in two layers for the idea itself.
- Handles messages
- SSL defines these protocols in it’s layers, as well as others.
SSL: Handshake Protocol
- Authenticates the server, client, and messages needed to send private data.
SSL: Change Cipher Set Protocol
- Exchange for cryptographic messages
- Send/receive messages during the procedure.
SSL: Alert Protocol
- Alerts used for reporting errors or abnormal activity
SSL: Record Protocol
- Carries messages from the upper layer
- Message is fragmented/compressed.
- Negotiated hash algorithm
E-Mail Security
- The creation of a session is not applicable to e-mails.
- Two protocols provide mail security through Pretty Good Privacy and Secure/Multipurpose Internet Mail Extension (S/MIME).
Security Algorithms
- Agree on cryptographic algorithms to use
- No session to negotiate a hand shake for algorithms.
- Alice includes her system information.
- Identifier for the MD5 message.
Secured Keys Through Crytography
- One time secret key sent with the message.
- Key to protect from interception, secret key encrypted with public key.
Certificates
- Certain algorithms must be used for e-mail key.
- Messages need to be signed to encrypt the secret.
Pretty Good Privacy
- Pretty Good Privacy (PGP) provides e-mail with privacy, integrity, and authentication.
- Is often used to creat secure messages for e-mail.
PGP Authentication
- Alice uses authentication that will need to show private data key and public data key.
Public Key Protection
- Can be made more secure with data compression.
PGP: Key Rings
- Used or needed for many individuals.
- Alice should have public keys
- In addition to PGP’s designer, specified a private /public key.
PGP Algorithms
- A set of asymmetric-key techniques ,cryptography hashing and compressions.
PGP Certificates
- Authentication is a key requirement to PGP
- Public Keys is the security, in all similar steps.
S/MIME
- Extension for e-mail access and secured communication via secured data.
- Uses the MIME protocol.
Cryptograph Message Syntax
- S/MIME defines how security services work.
- Syntax defines the scheme
- Referenced by RFC 3369/3370
Firewalls for Control
- Need firewall to keep out unwanted information.
- Forwards only some packets
Packet-Filter Firewalls
- Packet blocker, to base packets on IP.
- Transport/layer header
- TCP/UDP
- Router uses filtering patterns and discards unwanted content.
Proxy Firewalls
- Based on the layer of transport through the network,
- Can filter data based on message itself.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.