2 Different protocols for IPSec
2. Encapsulating Security Payload(ESP) ? whole suite of security
Advanced Encrption Standard (AES)
Uses Rijndael Block Cipher. Incorporates variable block cipher and key lengths. Uses a key size of 128.192, or 256. Approved by government
Asymmetric key algorithms
Asymmetric Key Cryptography
A method of encoding information that uses 2 keys and a one?way function. Public key encrypts, private key decrypts. can perform authenticatoin and non?repudiation. a/k/a public key cryptography
Block Cipher
An encryption method that breaks the message into blocks of data bits. Each block is encoded.
Blowfish
Block cipher with block lengths, encrypted thru 16 X of 64 bits and key lengths up to 448 bits.
Ceaser Cipher
Common form of substitution. Moves each letter 3 places forward in relation to its number.
Characteristics of a message hash
Clipper Chip
An encryption chip for digital voice communications that automatically encrypts and decrpyts.
Concealment Cipher
A predetermined key or groups of words used to decode a message, such as reading only every fourth word.
Cryptanalysis
Breaking or cracking the code and deciphering the data without authorization
Cryptosystem
A system for encoding and deciphering data.
Data Encryption Standard (DES)
56 bit cipher key for symmetric key encryption. Remaining 8 bits are used for parity, performed through 16 rounds. Susceptible to brute force attacks
Decipher
To decode the data
Differential Cryptanalysis
Compares two plain text data sets suring encryption to determine probably keys. Often used against block ciphers.
Digital Signature
Validates identity of sender. approved by NIST via SHS
Encipher
To code the data
Factoring
Attempting to determine the prime factors of the keys.
International Data Encryption Algorithm (IDEA)
Block cipher with block lengths of 64 bits divided into 16 bit units and encrypted 8 X. key lengths of 128 bits
Key Escrow
Form of symmetric key cryptography used by law enforcement. Third party agency maintains the key.
Keyspace
The group of numbers used to create a key.
Linear Cryptanalysis
Compares known plain text and ciphertext to determine probably keys
Man?in?the?middle
Intercepting messages between the sender and receiver
Meet?in?the?middle
Compares known plaintext and keys to intercepted encrypted text.