Monday, May 6, 2013

Chapter 11: Securing TCP/IP Pg 359 - 368

Making TCP/IP Secure

  • Four Areas:
    • Encryption
      • to scramble, mix up, or change the data in such a way that makes certain people unable to read it
    • Nonrepudiation
      • the process that guarantees that the data is the same as orginally sent and that it came from the source you think it should have come from 
    • authentication
      • to verify that whoever accesses the data is the person you want accessing that data 
    • authorization 
      • defines what a person accessing the data can do with that data 
Encryption
  • plaintext: data is in an easily read or viewed industry-wide standard form 
    • also referred to as cleartext 
  • cipher: a series of complex and hard to reverse mathematics you run on a string of ones and zeroes to make an new set of seeming meaningless ones and zeros 
  • complete algorithm: the method used to implement a cipher
  • symmetric-key algorithm: any encryption that uses the same key for both encryption and decryption 
Symmetric-Key Algorithm Standards
  • most algorithms are called block ciphers because they encrypt data in single chunks
    • work well when data comes in clearly discrete chunks
  • stream cipher: takes a single bit at a time and encrypts quickly
  • Data Encryption Standard(DES)
    • used a 64-bit block and a 56-bit block key 
  • Rivest Cipher 4(RC4): 
  • Advanced Encryption Standard (AES)
    • a block cipher 
    • uses 128-bit block size
    • uses 128-, 192-, and 256-bit key size
Asymmetric-Key Algorithm Standards
  • Public-Key Crytography:
    • allowed keys to be exchanged securely
  • Ribest shamir Adleman(RSA)
    • fully functional algorithm that enabled secure digital signatures

No comments:

Post a Comment