mywiki:encryption:encryption:start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| mywiki:encryption:encryption:start [2015/11/24 06:51] – [Common Terms] shaoguoh | mywiki:encryption:encryption:start [2019/09/15 18:55] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| Encryption | Encryption | ||
| - | ^ Reference | [[https:// | + | ^ Reference | [[https:// |
| ====== Ciphers ====== | ====== Ciphers ====== | ||
| - | ^ Ciphers | Description | Example | | + | ^ Ciphers |
| | Block Cipher | Break messages into fixed length blocks, and encrypt each block using the same key | (3)DES, AES/ | | Block Cipher | Break messages into fixed length blocks, and encrypt each block using the same key | (3)DES, AES/ | ||
| | Stream Cipher | Break message into fixed length blocks, but use a sequence of keys to encrypt the blocks | Vigenère cipher, RC4, SEAL | | | Stream Cipher | Break message into fixed length blocks, but use a sequence of keys to encrypt the blocks | Vigenère cipher, RC4, SEAL | | ||
| Line 12: | Line 12: | ||
| | Synchronous Stream Ciphers | generates the key string from a source other than the message itself | | | Synchronous Stream Ciphers | generates the key string from a source other than the message itself | | ||
| | Self-Synchronous Stream Ciphers | obtain a key from the message itself | | | Self-Synchronous Stream Ciphers | obtain a key from the message itself | | ||
| + | |||
| + | ^ Cipher by the type of input data | Description | | ||
| + | | symmetric key algorithms | the same key is used for encryption and decryption | DES, AES | | ||
| + | | asymmetric key algorithms | two different keys are used for encryption and decryption | RSA | | ||
| Line 19: | Line 23: | ||
| | Counter Mode (CTR Mode) | | | Counter Mode (CTR Mode) | | ||
| | Output Feedback Mode (OFB Mode) | | | Output Feedback Mode (OFB Mode) | | ||
| + | |||
| + | |||
| + | | Cryptographic hash functions | | ||
| + | | digital signatures | | ||
| + | | message authentication codes (MACs) | | ||
| + | |||
| + | |||
| + | ====== Default Hash vs HMAC ====== | ||
| + | |||
| + | | Default hash | without key | | ||
| + | | HMAC | with key | | ||
| + | |||
| + | If you're using a simple hash of a file to guarantee file-integrity, | ||
| + | |||
| + | With a HMAC, a key is used when calculating the hash value, so unless the attacker has the key, they' | ||
| + | |||
| + | ====== IPSEC ====== | ||
| + | IPsec uses two types of algorithms | ||
| + | - authentication algorithms | ||
| + | - encryption algorithms | ||
| + | |||
| + | authentication: | ||
| + | |||
| + | Encryption algorithms: use a shared **key** to verify the authenticity of the IPsec devices. | ||
| + | |||
| + | - DES, 3DES, | ||
| + | - AES-CBC 128, 192, and 256, | ||
| + | - AES-GCM 128, 192, and 256. | ||
| + | - | ||
| + | Note: AES-GCM is both an integrity and encryption algorithm and is described in the Integrity algorithms section. | ||
| + | |||
| + | Authentication methods: Authentication methods define the way in which a computer or user can securely assert identity to a remote computer. The methods involve sharing credentials that can be cryptographically verified, proving that the sending computer or user is who it claims to be. | ||
| + | - Preshared key | ||
| + | - Kerberos V5 | ||
| + | - Certificate | ||
| + | - NTLMv2 | ||
| + | - Certificate with ECDSA P-256 and ECDSA P-384 | ||
| + | |||
| + | Integrity algorithms: | ||
| + | |||
| + | - MD5 | ||
| + | - SHA-1, SHA-256, and SHA-384 | ||
| + | - AES-GMAC 128, 192, and 256 | ||
| + | - AES-GCM 128, 192, and 256 | ||
| + | |||
| + | IPSEC features: | ||
| + | |||
| + | - Data confidentiality—The IPSec sender can encrypt packets before transmitting them across a network. | ||
| + | - Data integrity—The IPSec receiver can authenticate packets sent by the IPSec sender to ensure that the data has not been altered during transmission. | ||
| + | - Data origin authentication—The IPSec receiver can authenticate the source of the IPSec packets sent. This service is dependent upon the data integrity service. | ||
| + | - Antireplay—The IPSec receiver can detect and reject replayed packets. | ||
| + | |||
| + | |||
| + | ===== IPSEC anti-replay in Linux ===== | ||
| + | static int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb) | ||
| + | |||
| + | |||
| + | |||
| Line 27: | Line 89: | ||
| | DES | Data Encryption Standard | | | DES | Data Encryption Standard | | ||
| | AES | Advanced Encryption Standard | | | AES | Advanced Encryption Standard | | ||
| + | | plaintext | the original message | | ||
| + | | ciphertext | the coded message | | ||
| + | | cipher | algorithm for transforming plaintext to ciphertext | | ||
| + | | key | info used in cipher known only to sender/ | ||
| + | | encipher (encrypt) | converting plaintext to ciphertext | | ||
| + | | decipher (decrypt) | recovering ciphertext from plaintext | | ||
| + | | cryptography | study of encryption principles/ | ||
| + | | cryptanalysis (codebreaking) | the study of principles/ methods of deciphering ciphertext without knowing key | | ||
| + | | cryptology | the field of both cryptography and cryptanalysis | | ||
| + | |||
| + | |||
| + | |||
| + | Authentication—The assurance to one entity that another entity is who he/she/it claims to be. | ||
| + | |||
| + | Integrity—The assurance to an entity that data has not been altered (intentionally or unintentionally) between " | ||
| + | |||
| + | Confidentiality—The assurance to an entity that no one can read a particular piece of data except the receiver(s) explicitly intended. | ||
| + | |||
mywiki/encryption/encryption/start.1448319081.txt.gz · Last modified: (external edit)
