13.7 Resources

Important Terms Introduced

  • active attack

  • application transparency

  • cipher suite

  • compression

  • default keying

  • end-to-end crypto

  • key block

  • link encryption

  • manual keying

  • metadata

  • network transparency

  • one big cryptonet

  • passive attack

  • proxy encryption

  • self-rekeying

  • SSL session

  • traffic analysis

  • transport mode

  • tunnel mode

  • wardriving

Abbreviations Introduced

  • AH—Authentication Header

  • ESP—Encapsulating Security Payload

  • GPG—Gnu Privacy Guard

  • HMAC—hashed message authentication code

  • HTTPS—Hypertext Transfer Protocol Secure

  • ICV—integrity check value

  • IKE—Internet Key Exchange

  • IPsec—IP Security Protocol

  • KDC—key distribution center

  • KRACK—Key Reinstallation Attack

  • MAC—message authentication code

  • MIC—message integrity check

  • PEM—Privacy-Enhanced ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.