Front | Back |
IPSec (IP Security)
|
Works on Layer 3 (Network Layer). Two major protocols are "Authentication Header" (AH) and "Encapsulation Security Payload" (ESP). AH serves authentication only, ESP provide authentication and encryption. Work on transport mode and tunnelling mode
|
VPN
|
Virtual Private Network
|
Site-to-site VPN
|
(or intranet VPN) Allows a company to connect its remote sites over the internet
|
Extranet VPN
|
Allows an organization's suppliers, partners to be connected to the corporate network for a limited B2B way.
|
SSL (Secure Socket Layer)
|
Create by Netscape, it's based on RSA public key encryption. Service independent.
|
SSL VPN
|
Process of using SSL to create a VPN
|
TLS (Transport Layer Security -)
|
SSL merged with another transport layer security protocol.
|
L2TP (Layer 2 Tunnelling Protocol)
|
Combination of Microsoft's Point-to-point tunnelling protocol (PPTP) and Cisco's Layer 2 Forwarding (L2F). Works on the Data Link Layer 2, support many non TCP/IP protocols
|
PPTP (Point-to-point Tunnelling Protocol)
|
Combines the unsecured PPP (Point-to-point protocol)session with a secure session using "Generic Routing Encapsulation" (GRE) protocol. Is a VPN protocol that runs on port 1723 and allows encryption to be done at the application level.
|
Private Encryption Keys
|
Symmetrical keys - Both the sender and receiver have the same key and use to encrypt and decrypt all messages.
|
Data Encryption Standard (DES)
|
Private Encryption Key. Uses lookup and tables functions. Work faster than public-key systems. It uses 56-bit private keys.
|
Triple Data Encryption Standard (3DES)
|
It's 3 DES encryption methods combine into one. So it encrypts 3 times and allow us to use up to 3 separate keys. Key length of 168-bits (56x3), but due to complex type of attack known as "meet-in-the-middle" it provides only 112-bits. Too slow.
|
Advanced Encryption Standard (AES)
|
(AKA Rijndael) Private Encryption Key. It specifies keys of 128, 192 and 256-bits. Very difficult to crack. "Official" encryption standard in the USA.
|
Public Key Encryption
|
Uses "Diffie-Hellman algorithm" which employs a public key and a private key. The sending's machine public key is used to encrypt a message to the receiving machine that it uses to decrypt the message with a private key.
|
RSA Data Security
|
Public Key algorithm created by 3 MIT scientists.
|