Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1. The X.

509 certificate format is used in S/MIME, IP Security, and SSL/TLS and


SET.
2. Public-key infrastructure (PKI) revokes digital certificates based on asymmetric
cryptography.
3. The requirements were defined by Kerberos Secure, Reliable, Transparent, and
Scalable.
4. IPsec provides the capability to secure communications across a LAN, across private
and public WANs, and across the Internet.
5. Secure Electronic Transaction (SET) is an open encryption and security
specification designed to protect credit card transactions on the Internet.
6. Secure socket layer (SSL) provides security services between TCP and applications
that use TCP.
7. In Tunnel mode the AH, authenticate the entire IP Packet plus selected portion of
outer IP Header.
8. Transport Layer Security is defined as a Proposed Internet Standard in RFC 2246.
9. A replay attack is one in which an attacker obtains a copy of an authenticated packet
and later transmits it to the intended destination.
10. A key concept that appears in both the authentication and confidentiality mechanism
for IP is the security association (SA).
11. Hash function that maps a message of any length to fixed length which serves as
authentication.
12. Secure/Multipurpose Internet Mail Extension is an Internet standard approach to email security that incorporates the same functionality as PGP.
13. Kerberos is an authentication service developed as a part of project Athena at MIT.
14. Transport mode Provide the protection for upper layer protocol between two hosts.
15. The dual signature is to link two messages that intended for two different recipients
and avoid misplacement of orders.
16. The function areas of IP security are Authentication, Confidentiality, and Key
management.
17. The classes of message authentication function are Message encryption, Message
Authentication Code and Hash function.
18. SSL use HMAC algorithm except that the padding bytes concatenation.
19. Message Authentication Code is a function of message and secret key which
produce a fixed length value.
20. TELNET is an abbreviation for terminal network.
21. PGP uses the idea of certificate trust levels.
22. In cryptography, a certificate authority (CA) is an entity that issues digital
certificates.
23. Establishing extranet and intranet connectivity with partners is an application of
IPsec.

24. The key algorithms Digital signature standards, Diffi Hellman and RSA algorithm are
used in S/MIME.
25. IPsec defines two protocols AH and ESP.

You might also like