▶ 13.7 Resources
Important Terms Introduced
active attack
application transparency
cipher suite
compression
default keying
end-to-end crypto
key block
link encryption
manual keying
metadata
network transparency
one big cryptonet
passive attack
proxy encryption
self-rekeying
SSL session
traffic analysis
transport mode
tunnel mode
wardriving
Abbreviations Introduced
AH—Authentication Header
ESP—Encapsulating Security Payload
GPG—Gnu Privacy Guard
HMAC—hashed message authentication code
HTTPS—Hypertext Transfer Protocol Secure
ICV—integrity check value
IKE—Internet Key Exchange
IPsec—IP Security Protocol
KDC—key distribution center
KRACK—Key Reinstallation Attack
MAC—message authentication code
MIC—message integrity check
PEM—Privacy-Enhanced ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.