Cryptography: Concepts and Services

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which cryptographic service ensures that data is not accessed by unauthorized parties?

  • Non-repudiation
  • Integrity
  • Authentication
  • Confidentiality (correct)

Which of the following is a primary goal of authentication in cryptographic services?

  • Providing irreversible data transformation
  • Verifying the identity of the sender or receiver (correct)
  • Ensuring data remains unaltered during transit
  • Concealing the data content from unauthorized parties

What cryptographic service provides assurance that data has not been altered in transit or storage?

  • Authentication
  • Integrity (correct)
  • Non-repudiation
  • Confidentiality

Which of the following best describes the purpose of hashing in cryptographic integrity?

<p>Creating a unique, fixed-size representation of data to detect changes (C)</p>
Signup and view all the answers

What is the primary advantage of using asymmetric encryption over symmetric encryption for key exchange?

<p>Elimination of the need to exchange secret keys (D)</p>
Signup and view all the answers

Which of the following algorithms is NOT primarily used for encryption?

<p>SHA (C)</p>
Signup and view all the answers

In the context of cryptographic services, what does HMAC provide in addition to data integrity?

<p>Authentication (A)</p>
Signup and view all the answers

Which of the following statements is true regarding symmetric encryption?

<p>It requires a secure method to exchange the secret key. (D)</p>
Signup and view all the answers

What is the purpose of a digital certificate?

<p>To verify the identity of a user or device (B)</p>
Signup and view all the answers

Which entity typically signs a digital certificate?

<p>A Certificate Authority (CA) (D)</p>
Signup and view all the answers

What is a key property of digital signatures?

<p>Signatures provide authentication and non-repudiation. (D)</p>
Signup and view all the answers

Which of the following describes the role of a Registration Authority (RA) in a PKI?

<p>Verifying the identity of the certificate requester (D)</p>
Signup and view all the answers

In asymmetric cryptography, Alice encrypts a message using Bob's public key. Who can decrypt this message?

<p>Only Bob, using his private key (C)</p>
Signup and view all the answers

What is the purpose of the Diffie-Hellman key exchange algorithm?

<p>To securely exchange cryptographic keys over a public channel (D)</p>
Signup and view all the answers

Which of the following is a characteristic of symmetric encryption algorithms?

<p>They require a secure channel for key distribution. (A)</p>
Signup and view all the answers

Which key is used to decrypt a message when using asymmetric encryption?

<p>The receiver's private key (D)</p>
Signup and view all the answers

What is the main purpose of a Certificate Authority (CA)?

<p>To issue and manage digital certificates (D)</p>
Signup and view all the answers

Which of these choices is considered the LEAST secure method for authentication?

<p>PSK (B)</p>
Signup and view all the answers

Which of the following hash algorithms is considered more secure?

<p>SHA-256 (A)</p>
Signup and view all the answers

For ensuring Confidentiality with encryption, which combination is considered the MOST secure?

<p>AES (A)</p>
Signup and view all the answers

How does asymmetric key cryptography contribute to authentication?

<p>By allowing a sender to encrypt a message digest with their private key, creating a digital signature. (D)</p>
Signup and view all the answers

Which of the following best describes the purpose of 'non-repudiation' in the context of cryptographic services?

<p>Preventing a sender from denying that they sent a message. (D)</p>
Signup and view all the answers

In a Public Key Infrastructure (PKI), what is the primary responsibility of the Certificate Authority (CA)?

<p>To digitally sign and issue certificates. (D)</p>
Signup and view all the answers

Which of the following algorithms would you most likely use if you wanted to focus primarily on performing a 'Key-Exchange'?

<p>Diffie-Hellman (B)</p>
Signup and view all the answers

What is the purpose of applying a hash function to data before digitally signing it using asymmetric cryptography?

<p>To reduce the amount of data to be signed, improving efficiency (D)</p>
Signup and view all the answers

Which of the following is a key benefit typically associated with implementing VPNs?

<p>Improved network security and cost savings. (B)</p>
Signup and view all the answers

In the context of VPN technologies, what is the primary difference between a site-to-site VPN and a remote-access VPN?

<p>Site-to-site VPNs securely connect entire networks, while remote-access VPNs allow individual users to connect to a private network. (C)</p>
Signup and view all the answers

Which of the following is a component specifically associated with a remote-access VPN setup?

<p>VPN terminating device and client-side software. (B)</p>
Signup and view all the answers

In an IPsec VPN, which protocol provides authentication and integrity but does not provide confidentiality?

<p>AH (Authentication Header). (C)</p>
Signup and view all the answers

Which of the following statements best describes the function of the ESP protocol in IPsec?

<p>It provides encryption, integrity, and authentication of the data payload. (D)</p>
Signup and view all the answers

Which of the following algorithms is considered the most secure for encryption?

<p>AES (Advanced Encryption Standard). (C)</p>
Signup and view all the answers

Which of the following hash algorithms is generally considered more secure?

<p>SHA. (A)</p>
Signup and view all the answers

Which of the following is a method to authenticate peers?

<p>Both RSA and PSK. (C)</p>
Signup and view all the answers

Diffie-Hellman is uses for:

<p>Key Exchange. (D)</p>
Signup and view all the answers

In the context of IPsec, what is the primary function of Internet Key Exchange (IKE)?

<p>To establish and manage security associations (SAs) between devices. (C)</p>
Signup and view all the answers

During IKE Phase 1, what is the primary goal?

<p>To establish a secure channel for subsequent negotiations. (A)</p>
Signup and view all the answers

Which task is not performed in IKE Phase 2?

<p>Authenticating peers. (B)</p>
Signup and view all the answers

When configuring a site-to-site IPsec VPN with pre-shared key authentication, what must match on both VPN endpoints?

<p>The pre-shared key and the IPsec policies. (B)</p>
Signup and view all the answers

What is the purpose of an extended access list when configuring IPsec?

<p>To define the traffic that will be encrypted and protected by the VPN. (A)</p>
Signup and view all the answers

What is the function of a crypto map?

<p>It binds together various components, such as the ACL, IPsec transform set, and peer IP address, into a single policy. (A)</p>
Signup and view all the answers

Which command is used to apply a crypto map to an interface?

<p><code>interface &lt;interface-id&gt;</code> then <code>crypto map &lt;map-name&gt;</code> (D)</p>
Signup and view all the answers

After configuring a crypto map, what command is essential to verify the IPsec VPN tunnel is operational?

<p><code>show crypto isakmp sa</code> and <code>show crypto ipsec sa</code>. (D)</p>
Signup and view all the answers

What command on a Cisco router is used to configure the pre-shared key for IKE?

<p><code>crypto isakmp key &lt;key-string&gt; address &lt;peer-address&gt;</code> (B)</p>
Signup and view all the answers

Which command is used to define the parameters for data encryption and authentication used in IPsec?

<p><code>crypto ipsec transform-set</code> (D)</p>
Signup and view all the answers

When configuring an IPsec VPN, the command set pfs group24 is used within the crypto map configuration. What does pfs stand for?

<p>Perfect Forward Secrecy. (A)</p>
Signup and view all the answers

If a newly configured crypto map remains disabled even after configuring an access list and peer, what key element might be missing?

<p>The crypto map has not been applied to an interface. (C)</p>
Signup and view all the answers

After applying a crypto map to an interface, what message confirms ISAKMP is active?

<p><code>%CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON</code> (A)</p>
Signup and view all the answers

What happens if you do not put in the correct access list when attempting to perform the key exchange?

<p>Phase 1 would not complete. (D)</p>
Signup and view all the answers

Which of the following correctly identifies how to test and verify that interesting traffic is working?

<p>All of the other answers. (B)</p>
Signup and view all the answers

When verifying that the VPN is working, what does QM_IDLE mean?

<p>This means Quick Mode Phase 2 is completed and the VPN Tunnel is up! (A)</p>
Signup and view all the answers

Flashcards

Cryptography

The process of encoding messages to keep them secret.

Authentication

Verifying the identity of a user, device, or other entity in a computer system.

Integrity

Ensuring that data is not altered or corrupted during transmission or storage.

Confidentiality

Protecting information from unauthorized access.

Signup and view all the flashcards

Key Management & Exchange

The procedures and mechanisms for generating, distributing, storing, and revoking cryptographic keys.

Signup and view all the flashcards

Public Key Cryptography

A cryptographic system using pairs of keys: public keys (widely distributed) and private keys (known only to the owner).

Signup and view all the flashcards

Confidentiality with Encryption

A cryptographic service that ensures only authorized parties can access the content of a message or data.

Signup and view all the flashcards

Hashing

A process that transforms data of any size into a fixed-size string of bytes. It detects data modification.

Signup and view all the flashcards

Symmetric Encryption

Encryption where the same key is used to encrypt and decrypt data.

Signup and view all the flashcards

Asymmetric Encryption

Encryption where different keys are used to encrypt and decrypt data.

Signup and view all the flashcards

Key Exchange

The process of securely exchanging cryptographic keys between two parties so that only they can read the message.

Signup and view all the flashcards

CIA Services Framework

A framework of confidentiality, integrity, and authentication services that protects data.

Signup and view all the flashcards

Symmetric Encryption Algorithms

An algorithm where the same secret key is used for both encryption and decryption.

Signup and view all the flashcards

Asymmetric Encryption

Using different keys for encryption and decryption to provide confidentiality.

Signup and view all the flashcards

Peer Authentication Methods

Methods for verifying identities to prevent spoofing. Most to least secure -> RSA, PSK.

Signup and view all the flashcards

Integrity

Guarantees that data has not been altered in transit by calculating hashes.

Signup and view all the flashcards

Integrity: Hash Algorithms

The hash value should be different.

Signup and view all the flashcards

HMAC

A keyed-hash message authentication code that uses a cryptographic key and a hash function.

Signup and view all the flashcards

Key Exchange: Digital Signatures

An encryption algorithm that refers to private and public keys.

Signup and view all the flashcards

Diffie-Hellman Key Exchange

A method of exchanging cryptographic keys securely.

Signup and view all the flashcards

Digital Certificate

An electronic document that proves the ownership of a public key.

Signup and view all the flashcards

PKI Framework

An infrastructure that establishes trust and authenticity in online transactions using digital certificates.

Signup and view all the flashcards

Certification Authority (CA)

An entity that verifies the identity of certificate requests and issues certificates.

Signup and view all the flashcards

Registration Authority

The process of obtaining a digital certificate from an authority.

Signup and view all the flashcards

VPN

A secured, private network that uses the public network (Internet) to connect remote sites or users together.

Signup and view all the flashcards

VPN Benefits

Reduced infrastructure costs by using the internet. Increased security through encryption and authentication. Increased scalability and reach.

Signup and view all the flashcards

Site-to-Site VPN

Connects entire networks (e.g., branch to HQ). No special client software is needed on end-user devices.

Signup and view all the flashcards

Remote-Access VPN

Allows individual users to connect securely to a private network, needs client software.

Signup and view all the flashcards

IPsec

A suite of protocols that provides a secure channel between two networks or devices over the Internet.

Signup and view all the flashcards

Authentication Header (AH)

Provides integrity using a hash function and authentication but does not provide encryption.

Signup and view all the flashcards

Encapsulating Security Payload (ESP)

Provides confidentiality (encryption), integrity, and authentication. Uses encryption to keep data secret.

Signup and view all the flashcards

Internet Key Exchange (IKE)

Security protocol that provides a method to negotiate security associations in the VPN tunnel.

Signup and view all the flashcards

IPsec Negotiation

The negotiation of security parameters and establishment of a secure tunnel in IPsec.

Signup and view all the flashcards

Pre-Shared Key (PSK)

A method of authentication where both sides share the same secret key.

Signup and view all the flashcards

Interesting Traffic

Defines the traffic that will be protected by the VPN. Uses access control lists (ACLs).

Signup and view all the flashcards

IPsec Transform Set

Specifies the encryption algorithm and authentication method used by IPsec. Example: ESP-AES-SHA.

Signup and view all the flashcards

Crypto Map

A set of rules applied to an interface to trigger IPsec protection. Contains ACL, transform set, and peer information.

Signup and view all the flashcards

IKE Phase 1

The first phase of IKE, negotiates ISAKMP policy to create a secure tunnel.

Signup and view all the flashcards

IKE Phase 2

The second phase of IKE, negotiates IPsec policy for securing traffic across the tunnel.

Signup and view all the flashcards

Study Notes

Introduction to VPNs

  • VPNs provide cost savings, security, scalability, and compatibility.
  • VPNs allow business partners, regional offices, SOHOs, and mobile workers to securely connect to a main site.
  • VPN connections can be established using Layer 3 IPsec.
  • VPNs connect branch offices, mobile users, and SOHOs through the internet to a central site.

VPN Technologies

  • Two main types of VPNs exist: remote-access, and site-to-site.
  • Remote-Access VPNs:
    • Require a client to initiate a VPN connection.
    • Include a VPN Terminating Device.
  • Site-to-Site VPNs:
    • Do not require client knowledge of the VPN.
    • Include a VPN Terminating Device.

IPsec VPN Components

  • IPsec provides a framework of security protocols to achieve secure transmissions across IP networks.
  • IPsec includes:
    • Authentication Header (AH).
    • Encapsulating Security Payload (ESP).
    • Internet Key Exchange (IKE).
  • IPsec offers choices for:
    • IPsec Protocol.
    • Confidentiality.
    • Integrity.
    • Authentication.
    • Diffie-Hellman.

Understanding Confidentiality with Encryption

  • Encryption transforms data.
  • Unauthorized users are not able to read the data.
  • Encryption algorithms include DES (56-bit key), 3DES (56-bit key x3), AES (128, 192, or 256-bit key lengths), and SEAL (160-bit key length).
  • AES provides more security then other algorythms

Integrity with Hash Algorithms

  • Secure hash algorithms ensure the integrity of information
  • Hash Algorithms include MD5 (128 bits) and SHA (160 bits).

Authentication Methods

  • PSK involves using authentication keys and IDs
  • RSA involves using Digital Signatures

Key Exchange with Diffie-Hellman

  • Diffie-Hellman includes DH1, DH2, DH5, DH14, DH15, DH16, DH19, DH20, DH21, DH24

IPsec Protocols: AH and ESP

  • Authentication Header (AH) ensures data integrity and authentication but does not encrypt data.
  • Router creates a hash and transmits it to peer.
  • Peer router compares the recomputed hash to the received hash.
  • ESP encrypts the data payload while providing integrity and authentication.

Transport and Tunnel Modes

  • ESP and AH can be applied in transport or tunnel mode.

Internet Key Exchange (IKE) Protocol

  • Phase 1 negotiates ISAKMP policy to create a tunnel.
  • Phase 2 negotiates IPsec policy for sending secure traffic across the tunnel.
  • Phase 2 negotiates Security Associations (SAs)

Configuring Site-to-Site IPsec VPNs with CLI

  • Configuration Steps:
    • Configure ISAKMP policy.
    • Configure the IPsec policy.
    • Configure and apply a crypto map.
    • Apply the IPsec policy.
    • Verify the IPsec VPN.

Important Topology Addresses For Configuration

  • Site 1 has the address 10.0.1.0/24
  • Site 2 has the address 192.168.1.0/24
  • R1 has the address 172.30.2.1
  • R2 has the address 172.30.2.2

Describing IPsec Negotiation

  • Host A sends interesting traffic to Host B
  • R1 and R2 negotiate an IKE Phase 1 session.
  • R1 and R2 negotiate an IKE Phase 2 session.
  • Information is exchanged via the IPsec tunnel.
  • The IPsec tunnel is terminated.

ISAKMP policy configuration

  • Show crypto isakmp default policy
  • AES with 128 bit keys is default
  • Secure Hash Standard is default
  • Rivest-Shamir-Adleman Signature is default
  • IKE policy lifetime is 86400 seconds, no volume limit

Apply the configured crypto map to the interface

  • The configured crypto map must be applied to an interface for IPsec protection to take effect.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser