mywiki:encryption:encryption:start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| mywiki:encryption:encryption:start [2015/11/24 07:58] – [IPSEC] shaoguoh | mywiki:encryption:encryption:start [2019/09/15 18:55] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| Encryption | Encryption | ||
| - | ^ Reference | [[https:// | + | ^ Reference | [[https:// |
| ====== Ciphers ====== | ====== Ciphers ====== | ||
| Line 28: | Line 28: | ||
| | digital signatures | | | digital signatures | | ||
| | message authentication codes (MACs) | | | message authentication codes (MACs) | | ||
| - | | | ||
| + | |||
| + | ====== Default Hash vs HMAC ====== | ||
| + | |||
| + | | Default hash | without key | | ||
| + | | HMAC | with key | | ||
| + | |||
| + | If you're using a simple hash of a file to guarantee file-integrity, | ||
| + | |||
| + | With a HMAC, a key is used when calculating the hash value, so unless the attacker has the key, they' | ||
| ====== IPSEC ====== | ====== IPSEC ====== | ||
| Line 67: | Line 75: | ||
| - Antireplay—The IPSec receiver can detect and reject replayed packets. | - Antireplay—The IPSec receiver can detect and reject replayed packets. | ||
| + | |||
| + | ===== IPSEC anti-replay in Linux ===== | ||
| + | static int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb) | ||
mywiki/encryption/encryption/start.1448323110.txt.gz · Last modified: (external edit)
