Single Key
Symmetric encryption
Deffie Helman public key cryptosystem was based on
Asymmetric keys
Key which is uesd for duration of logical connection
Session keys
To enable secure, convenient and efficient acqusition of public keys which infrastucture was developed
Public key Infrastructure
AH means
Authentication protocol
Two keys
Asymmetric encryption
Readable message which is input to algorithm
Plaintext
TAG approach and Control vector approach are types of
Controlling key usage
PKIX management protocols
RFC-2510,RFC 2797
ESP full form
Encapsulating Security Payload
Vernam cipher and Vigenere cipher are types of
Polyalphabetic cipher
Encrypted message produced as output
Ciphertext
Adversary who can subsitute another message
Man in the middle attack
The process of verifying an identity claimed by or for a system entity
Remote user Authentication
IPsec interaction with two databases
Security association database, Security policy database
Trying all possible ways of attack
Brute force attack
Full form of RSA algorithm
Rivest Shamir Adleman
Distribution of public key has how many schemes
Four schemes
Protocol which enables communicating parties to satisfy themselves mutually about each others identity and to exchange session key
Mutual Authentication protocol
TFC stands for
Traffic flow confidentiality
Best known multiple letter encryption technquie
Playfair cipher
Attack depending on running time of decryption algorithm
Timing attack
Technique which support key generation, storage and maintenance of the key
Key management
Issues of Authentication protocol
Confidentiality and timeliness
EAP stands for
Extensible Authentication protocol