The document discusses various concepts related to cybersecurity including digital certificates, public key infrastructure, IPsec, SSL/TLS, S/MIME, and other protocols. It covers authentication methods like digital signatures and hashes, as well as encryption algorithms like RSA and Diffie-Hellman that are used to provide confidentiality. Application layer protocols for securing email and network traffic are also mentioned.
The document discusses various concepts related to cybersecurity including digital certificates, public key infrastructure, IPsec, SSL/TLS, S/MIME, and other protocols. It covers authentication methods like digital signatures and hashes, as well as encryption algorithms like RSA and Diffie-Hellman that are used to provide confidentiality. Application layer protocols for securing email and network traffic are also mentioned.
The document discusses various concepts related to cybersecurity including digital certificates, public key infrastructure, IPsec, SSL/TLS, S/MIME, and other protocols. It covers authentication methods like digital signatures and hashes, as well as encryption algorithms like RSA and Diffie-Hellman that are used to provide confidentiality. Application layer protocols for securing email and network traffic are also mentioned.
509 certificate format is used in S/MIME, IP Security, and SSL/TLS and
SET. 2. Public-key infrastructure (PKI) revokes digital certificates based on asymmetric cryptography. 3. The requirements were defined by Kerberos Secure, Reliable, Transparent, and Scalable. 4. IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. 5. Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit card transactions on the Internet. 6. Secure socket layer (SSL) provides security services between TCP and applications that use TCP. 7. In Tunnel mode the AH, authenticate the entire IP Packet plus selected portion of outer IP Header. 8. Transport Layer Security is defined as a Proposed Internet Standard in RFC 2246. 9. A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination. 10. A key concept that appears in both the authentication and confidentiality mechanism for IP is the security association (SA). 11. Hash function that maps a message of any length to fixed length which serves as authentication. 12. Secure/Multipurpose Internet Mail Extension is an Internet standard approach to email security that incorporates the same functionality as PGP. 13. Kerberos is an authentication service developed as a part of project Athena at MIT. 14. Transport mode Provide the protection for upper layer protocol between two hosts. 15. The dual signature is to link two messages that intended for two different recipients and avoid misplacement of orders. 16. The function areas of IP security are Authentication, Confidentiality, and Key management. 17. The classes of message authentication function are Message encryption, Message Authentication Code and Hash function. 18. SSL use HMAC algorithm except that the padding bytes concatenation. 19. Message Authentication Code is a function of message and secret key which produce a fixed length value. 20. TELNET is an abbreviation for terminal network. 21. PGP uses the idea of certificate trust levels. 22. In cryptography, a certificate authority (CA) is an entity that issues digital certificates. 23. Establishing extranet and intranet connectivity with partners is an application of IPsec.
24. The key algorithms Digital signature standards, Diffi Hellman and RSA algorithm are used in S/MIME. 25. IPsec defines two protocols AH and ESP.
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging