13.7 Resources

Important Terms Introduced

  • active attack

  • application transparency

  • cipher suite

  • compression

  • default keying

  • end-to-end crypto

  • key block

  • link encryption

  • manual keying

  • metadata

  • network transparency

  • one big cryptonet

  • passive attack

  • proxy encryption

  • self-rekeying

  • SSL session

  • traffic analysis

  • transport mode

  • tunnel mode

  • wardriving

Abbreviations Introduced

  • AH—Authentication Header

  • ESP—Encapsulating Security Payload

  • GPG—Gnu Privacy Guard

  • HMAC—hashed message authentication code

  • HTTPS—Hypertext Transfer Protocol Secure

  • ICV—integrity check value

  • IKE—Internet Key Exchange

  • IPsec—IP Security Protocol

  • KDC—key distribution center

  • KRACK—Key Reinstallation Attack

  • MAC—message authentication code

  • MIC—message integrity check

  • PEM—Privacy-Enhanced ...

Get Elementary Information Security, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.