What is IPSec?

IPSec. Internet Protocol security (IPSec) is used to encrypt IP traffic.  The IP Security (IPsec) architecture comprises a suite of protocols developed to ensure the integrity, confidentiality and authentication of data communications over an IP network. IPSec may be used in three different security domains: virtual private networks, application-level security and routing security.  IPsec is […]

Read More

How do you provide confidentiality with encryption?

Providing Confidentiality with Encryption Confidentiality ensures that data is only viewable by authorized users. Encryption provides confidentiality of data, including data at rest (any type of data stored on disk) and data in transit (any type of transmitted data). Symmetric encryption uses the same key to encrypt and decrypt data. As an example, Remote Authentication […]

Read More

What is Salting?

Password salting adds additional characters to passwords before hashing them, and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks. In cryptography, a salt is random data that is used as an additional input to a one-way function that “hashes” a password or passphrase. Salts are closely related to the concept […]

Read More

What is Encryption?

Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher […]

Read More

What is Diffie Hellman?

Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple.

Read More

What is a Digital Certificate?

In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document used to prove ownership of a public key.

Read More

What is PKI?

A Public Key Infrastructure (PKI) is a group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. A PKI allows two entities to privately share symmetric keys without any prior communication.

Read More

Using Cryptographic Protocols

When using digital signatures with email: The sender’s private key encrypts (or signs). The sender’s public key decrypts. A digital signature provides authentication (verified identification) of the sender, nonrepudiation, and integrity of the message. Senders create a digital signature by hashing a message and encrypting the hash with the sender’s private key. Recipients decrypt the […]

Read More

What are Symmetric Encryption Methods?

Symmetric encryption uses the same key to encrypt and decrypt data. As an example, Remote Authentication Dial-In User Service (RADIUS) uses a shared key for symmetric encryption. AES is a popular symmetric block encryption algorithm, and it uses 128, 192, or 256 bits for the key. DES is an older, symmetric block encryption algorithm. 3DES […]

Read More