Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
200 Cards in this Set
- Front
- Back
Blowfish is a symmetric block cipher that works on
|
64 -bit blocks of data and the key length of anywhere from 32 bits up to 448 bits.
|
|
In a Blowfish (symmetric block cipher) the data blocks go through
|
16 rounds of cryptographic functions
|
|
Bruce Schneier, the creator of blowfish has stated
|
Blowfish is un-patented, and will be remain so in all countries. The algorithm is placed in the public domain
|
|
RC4 (symmetric system) is one of the most commonly implemented
|
Stream Ciphers.
|
|
RC4 (Stream Cipher has a
|
Variable Key size and is used is SSL Protocol
|
|
RC4 was created by Ron Rivest in 1987 and was considered a trade secret for
|
RSA Data Security, Inc. until someone posted the source code on a miling list.
|
|
The stolen code of RC4 is sometimes implemented and refered to as
|
ArcFour or ARC4 because RC4 is trademarked.
|
|
RC4 algorithm is
|
Very Simple, Fast, and Efficient, which is why is became so popular.
|
|
What is the maximum key size for the RC5 algorithm (a blocke cipher)?
|
2040 bit. The block sizes used in RC5 are 32, 64 or 128 bits and the KEY size goes up to 2048 bits.
|
|
RC5 has a variety of parameters it can use for block size, key size and the number of rounds used.
|
The number of rounds can go up to 255
|
|
RC6 is a block cipher that was built upon
|
RC5. RC6 has all the attributes of RC5
|
|
What attribute is included in a X.509-certificate?
|
Distinguished name of the subject
|
|
What kind of certificate is used to validate a user identity?
|
Public key certificate
|
|
A code, as is pertains to cryptography:
|
Deals with linguistic units.
|
|
What is the primary role of smartcards in a PKI?
|
Tamper resistant, mobile storage and application of private keys of the users
|
|
Which protocols that provide integrity and authentication for IPSec, can also provide non-repudiation in IPSec?
|
Authentication Header (AH)
|
|
Block ciphers operates on
|
- Fixed-size blocks of plaintext
- More suitable for software than hardware implementations - Block ciphers can be operated as a stream. |
|
Block Ciphers work of blocks of bits and
|
Stream Ciphers work on one bit at a time
|
|
Symmetric algorithm is used for
|
Bulk encryption, which means encrypting files and communication paths
|
|
Asymmetric Algorithm is used for
|
Key Distribution and Digital signatures
|
|
The Security service provided by Symmetric systems is
|
Confidentiality
|
|
The Security service provided Asymmetric systems are
|
Authentication and nonrepudation
|
|
Hybrid Encryption Methods is
|
The Use of public key encryption to secure a secret key, and message encryption using the secret key
|
|
In a message digest
|
- The original file cannot be created from the message digest.
- Two different files should not have the same message digest - Messages digests are usually of fixed size. |
|
A strong Cipher contains the right level of two main attributes namely
|
Confussion and Diffusion
|
|
Confusion is mainly carried out through
|
Substitution
|
|
Diffussion is mainly carried out through
|
Transposition
|
|
In a block Cipher the Randomness of the key values and the complexity of the mathematical functions dictate the
|
Level of Confusion and Diffusion involved
|
|
Diffusion takes place as individual bits of blocks are
|
Scrambled, or diffused throughout that block
|
|
Confusion is provided by carryoing out
|
Complex substitution functions
|
|
Block Ciphers use Diffusion and
|
Confusion in their methods
|
|
The block Cipher algorithm has two has TWO layers of Four-bit substitution boxes called
|
S-boxes. Each S-box contains a lookup table used by the algorithm as instructions on how the bits should be encrypted
|
|
Most block ciphers work with blocks of
|
32, 64 or 128 bits
|
|
A block of cipher perfoms
|
Mathematical functions on on blocks of bits
|
|
A stream Cipher treats a message as a stream of bits and
|
Performs Mathematical functions on each bit individually
|
|
When using a stream cipher, a Plaintext bit will be transformed into a
|
Different Ciphertext bit each time it is encypted
|
|
Stream Ciphers use Keystream generators
|
Keystream generators
|
|
Keystream generators produce
|
A Stream of bits that is XORed with the plaintext bits to produce Ciphertext
|
|
A one-way hash is a function that takes a Variable-Length string and a message and produces a
|
Fixed-Length value called a Hash Value
|
|
The hashing one-way function takes place without the use of
|
Any keys
|
|
The hashing algorith is not a secret - it is publicly known. The secrecy of the
|
One-way hashing function is its "One-Wayness". One way-hash functions are never used in reverse like the one-way function used in public key cryptography in which the security provided is based not knowing a trapdoor
|
|
What algorithm was DES derived from?
|
Lucifer.
|
|
Which ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?
|
RSA
|
|
Multipurpose Internet Mail Extension (MIME) is a technical specification indicating how
|
Multimedia data and e-mail attachments are to be transferred.
|
|
If a messgae or document contains a Binary attachment
|
Multipurpose Internet Mail Extension (MIME) dictates how that portion of the messgae should be handled.
|
|
Secure Multipurpose Internet Mail Extension (S/MIME) is a standard for
|
Encrypting and digitally signing electonic mail and for providing secure data transmissions.
|
|
S/MIME follows the
|
Public Key Cryptography Standards (PKCS)
|
|
S/MIME provides Confidentiality through
|
Encryption algorithms
|
|
S/MIME provides Integrity through
|
Hashing algorithms
|
|
S/MIME provides Authentication through the use of
|
X.509 public key certificates
|
|
S/MIME provides Nonrepudation through
|
Cryptographically signed message digests
|
|
Which is NOT a suitable method for distributing certificate revocation information?
|
CA revocation mailing list
|
|
suitable method for distributing certificate revocation information are
|
- Delta CRL
- OCSP (online certificate status protocol) - Distribution point CRL |
|
Which statements pertaining to stream ciphers is correct?
|
A stream cipher generates what is called a keystream.
|
|
True 3DES mods are
|
- DES-EEE2 uses two keys
-DES-EEE3 uses three keys -DES-EDE2 uses two keys -DES-EDE3 uses three keys |
|
What does the directive of the European Union on Electronic Signatures deal with?
|
Non repudiation
|
|
Which would best define a Digital envelope?
|
A message encrypted with a secret key attached with the message. The secret key is encrypted with the public key of the receiver.
|
|
The use of Symmetric and Asymmetric cryptography together can be referred to as a
|
Hybrid approach, But more commonly as a Digital Envelope
|
|
What kind of Encryption technology does Verisign's SSL utilize?
|
Hybrid: Symmetric and asymmetric cryptography
|
|
IPsec is a framework that permits flexibility in choosing particular hashing, encryption, or key exchange mechanisms.
|
Depending on the implementation, key exchange may be a manual process or an automated one.
|
|
Internet Key Exchange (IKE). is a
|
Key exchange protocol that may be used in conjunction with ISAKMP.
|
|
ISAKMP is the key management protocol typically used with
|
IPsec, but ISAKMP intentionally excludes selection of any particular key exchange method.
|
|
Diffie-Hellman is a widely-used
|
Key exchange algorithm used by IKE.
|
|
What can be defined as secret communications where the very existence of the message is hidden?
|
Steganography
|
|
Key clustering is a situation in which a plaintext message generates
|
Identical ciphertext messages using the same transformation algorithm but with different keys
|
|
What type of attack against confidentiality uses algorithm and algebraic manipulation weaknesses to reduce complexity?
|
Analytic
|
|
A statistical attack uses a
|
Statistical weakness in the design.
|
|
A brute-force attack is a type of attack under which
|
Every possible combination of keys and passwords is tried
|
|
In a codebook attack, an attacker attempts to
|
Create a codebook of all possible transformations between plaintext and ciphertext under a single key.
|
|
Digital signature is a
|
Value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity
|
|
What is the range of SSL (Secure Sockets Layer) 'session key' lengths?
|
40 bit to 256 bit
|
|
TCP/IP protocol: TCP protocol controls the handsking and maintains the connection between been the User and the Server and the
|
IP protocol makes sure the file is routed properly throughout the Internet to get from the web server to the user.
|
|
HTTP is a stateless protocol which means
|
The Client and the Web Server make and break a connection for each other operation.
|
|
HTTP Secure (HTTPS) is
|
HTTP running over SSL..
- HTTP works at the application layer - SSL works at the Transport Layer. |
|
Secure Sockets Layer (SSL) uses Public Key Encryptions and provides
|
-Data Encryption
-Server Authentication -Message Integrity and - Optional Client Authentication |
|
A FIN Packet in (SSL) is an indication
|
to close out the commnucation channel sent by the CLient to the server
|
|
SSL requires an SSL-enabled server and browser. SSL provides security for the connection but does not offer
|
Security for the data ONCE received. This means the data are encrypted while being transmitted, but not after the data is received.
|
|
In the protocol stack, SSL lies beneath the Application layer and
|
And above the Network layer. This ensures that SSL is NOT limited to specific application protocols and can still use the communication transport standards of the Internet
|
|
For CISSP Exam SSL protocol works at the
|
Transport Layer (SSL is currently in Version 3)
|
|
Since SSL was developed by Netscape it is NOT
|
an Open-Community protocol.
|
|
The Open-Community version of SSL is
|
Transport Layer Security (TLS)
|
|
S-HTTP is a Technology that protects EACH message sent between two computers while
|
HTTPS protects the Communication Channel between two computers messages and all.
|
|
SSL Key lengths vary in size. Older browsers only support 40/56 bit key lengths but
|
Newer browsers such as I.E.6.0, Mozillia, and Firefox now support up to 256 bit encryption keys.
|
|
A public-key certificate binds
|
a subject name to a public key value, along with information needed to perform certain cryptographic functions.
|
|
An attribute certificate is a
|
digital certificate that binds a set of descriptive data items, other than a public key, either directly to a subject name or to the identifier of another certificate that is a public-key certificate
|
|
Kerberos depends upon what encryption method?
|
Secret Key cryptography.
|
|
Kerberos is an Authentication protocol designed in the mid 1980 as part of the MIT's Project Athena. IT works in a
|
Client/Server Model and is based on Symmetric Key Cryptography (Secret Key)
|
|
Kerberos has been used for many years in UNIX systems and is currently the defaut
|
Authentication methods for Windows, 200, 2003 and 2008 operating systems
|
|
Kerberos is an example of a
|
Single sign-on system for distributed environments and is a de facto standard for heterogeneous networks
|
|
Kerberos uses sysmetrik key cryptography and provides
|
End-to-End security.
|
|
The Most important Component within a Kerberos Environment is the
|
Key Distribution Center (KDC).
-KDC holds all users's and services secret keys. - KDC provides an authentication service as well as a Key distribution functionality. |
|
In a SSL session between a client and a server, who is responsible for generating the master secret that will be used as a seed to generate the symmetric keys that will be used during the session?
|
The client's browser
|
|
Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what purpose?
|
Message integrity.
|
|
A keyed hash also called a MAC (message authentication code) is used for
|
Integrity protection.
|
|
What is called the standard format that was established to set up and manage Security Associations (SA) on the Internet in IPSec?
|
Internet Key Exchange (IKE)
|
|
The Key management for IPSec is called the
|
Internet Key Exchange (IKE)
|
|
The IKE protocol is a hybrid of three other protocols:
|
- ISAKMP (Internet Security Association and Key Management Protocol)
- Oakley and - SKEME. |
|
ISAKMP provides a framework for
|
Authentication and Key exchange, but does not define them (neither authentication nor key exchange).
|
|
The Oakley protocol describes
|
A series of modes for key exchange
|
|
The SKEME protocol defines
|
Key exchange techniques.
|
|
IKE provides authentication of the IPSec peers,
|
Negotiates IPSec keys, and negotiates IPSec security associations.
|
|
IKE automatically negotiates IPSec security associations (SAs) and enables
|
IPSec secure communications without costly manual preconfiguration.
|
|
IKE provides these benefits:
|
- Eliminates the need to manually specify all the IPSec security parameters in the crypto maps at both peers.
- Allows you to specify a lifetime for the IPSec security association - Allows encryption keys to change during IPSec sessions - Allows IPSec to provide anti-replay services. -Permits certification authority (CA) support for a manageable, scalable IPSec implementation. - Allows dynamic authentication of peers. |
|
ISAKMP provides a framework for Internet key management and provides the specific protocol support for negotiation of security attributes.
|
Alone, it does not establish session keys. However it can be used with various session key establishment protocols, such as Oakley, to provide a complete solution to Internet key management
|
|
When ISAKMP is used with Oakley,
|
Key escrow is not feasible.
|
|
The Oakley protocol uses a hybrid Diffie-Hellman technique to establish session keys on Internet hosts and routers.
|
Oakley provides the important security property of Perfect Forward Secrecy (PFS) and is based on cryptographic techniques that have survived substantial public scrutiny. Oakley can be used by itself, if no attribute negotiation is needed, or Oakley can be used in conjunction with ISAKMP
|
|
IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides
|
Security for transmission of Sensitive information over unprotected networks such as the Internet. It acts at the network level
|
|
IPSec implements the following standards:
|
IPSec, Internet Key Exchange (IKE) , Data Encryption Standard (DES)
, MD5 (HMAC variant) , SHA (HMAC variant) , Authentication Header (AH) , Encapsulating Security Payload (ESP) |
|
IPSec services provide a robust security solution that is standards-based. IPSec also provides
|
Data authentication and anti-replay services in addition to data confidentiality services.
|
|
SKEME constitutes a compact protocol that supports a variety of realistic scenarios and security models over Internet. It provides
|
Clear tradeoffs between security and performance as required by the different scenarios without incurring in unnecessary system complexity. The protocol supports key exchange based on public key, key distribution centers, or manual installation, and provides for fast and secure key refreshment.
|
|
SKEME selectively provides perfect forward secrecy, allows for replaceability and
|
Negotiation of the underlying cryptographic primitives, and addresses privacy issues as anonymity and repudiatability
|
|
SKEME's basic mode is based on the use of public keys and a
|
Diffie-Hellman shared secret generation.
However, SKEME is not restricted to the use of public keys, but also allows the use of a pre-shared key |
|
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets correspond most closely to which of the following?
|
Public-key certificates
|
|
A Kerberos ticket is issued by a trusted third party. It is an encrypted data structure that includes the
|
Service encryption key. In that sense it is similar to a public-key certificate. However, the ticket is not key.
|
|
Properties of the Rijndael block cipher algorithm
|
- It employs a round transformation that is comprised of three layers of distinct and invertible transformations.
- It is suited for high speed chips with no area restrictions - It could be used on a smart card. |
|
IDEA cipher algorithm operates on
|
64-bit plaintext blocks and uses a 128 bit key.
|
|
Rijndael block cipher uses
|
128, 192 or 256 bits.
|
|
Secure Sockets Layer (SSL) provides security services at which layer of the OSI model?
|
Transport Layer
|
|
Brute force attacks against encryption keys have increased in potency because of increased computing power. Which of the following is often considered a good protection against the brute force cryptography attack?
|
The use of session keys.
|
|
Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?
|
Elliptic Curve Cryptography (ECC)
|
|
Which is the most secure form of triple-DES encryption?
|
DES-EDE3
|
|
Which is best be defined as a cryptanalysis technique in which the analyst tries to determine the key from knowledge of some plaintext-ciphertext pairs?
|
A known-plaintext attack
|
|
What are two types of ciphers?
|
Transposition and Substitution
|
|
In a Public Key Infrastructure (PKI) context, which is a Primary concern with LDAP servers?
|
Availability
|
|
Strong" encryption means
|
128-bit or longer key.
|
|
You've decided to identify the agent who initiated any particular transfer. You can do this by
|
Having the agent encrypt the hash with his private key.
|
|
What kind of encryption is realized in the S/MIME-standard?
|
Public key based, hybrid encryption scheme
|
|
The Diffie-Hellman algorithm is primarily used to provide
|
Key exchange
|
|
Pre shared key authentication within IKE/IPSec Protocol is normally based on
|
Simple passwords
|
|
Within IKE / IPsec protocol Only
|
One preshared key for all VPN connections is needed
|
|
How many bits is the effective length of the key of the Data Encryption Standard algorithm
|
56 bits
|
|
Internet Security Association and Key Management Protocol (ISAKMP) is an
|
Internet IPsec protocol to negotiate, establish, modify, and delete security associations, and to exchange key generation and authentication data, independent of the details of any specific key generation technique, key establishment protocol, encryption algorithm, or authentication mechanism.
|
|
Simple Key-management for Internet Protocols (SKIP) is a
|
Key distribution protocol that uses hybrid encryption to convey session keys that are used to encrypt data in IP packets
|
|
What size is an MD5 message digest (hash)?
|
128 bits
|
|
What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?
|
Authority revocation list
|
|
Certificate revocation list (CRL)
|
A data structure that enumerates digital certificates that have been invalidated by their issuer prior to when they were scheduled to expire.
|
|
Authority revocation list (ARL)
|
A data structure that eumerates digital certificates that were issued "TO CAs but have been invalidated" by their issuer prior to when they were scheduled to expire.
|
|
Authentication methodS within IKE and IPsec
|
- Pre shared key
- Certificate based authentication - Public key authentication |
|
PGP uses which of the following to encrypt DATA (NOTE date is the key word)?
|
A symmetric encryption algorithm BUT it use Asymmetric key algorithm to encrypt KEYS for distribution.
|
|
Which BEST provides e-mail message authenticity and confidentiality?
|
Signing the message using the sender's private key and encrypting the message using the receiver's public key
|
|
Which offers security to wireless communications?
|
Wireless Transport Layer Security (WTLS)
|
|
Electronic signatures can PREVENT messages from being:
|
Repudiated
|
|
Digital signature standard (DSS) provides
|
- Integrity
- Digital signature - Authentication |
|
What is called the substitution cipher that shifts the alphabet by 13 places?
|
ROT13 cipher
|
|
The computations involved in selecting keys and in enciphering data are complex, and are not practical for manual use. However, using mathematical properties of modular arithmetic and a method known as
|
"Computing in Galois fields" RSA is quite feasible for computer use.
|
|
In a known plaintext attack, the cryptanalyst has knowledge ?
|
Both the plaintext and the associated ciphertext of several messages
|
|
What principle involves encryption keys being separated into two components, each of which does not reveal the other
|
Split knowledge
|
|
A Public Key Infrastructure (PKI) is responsible for
|
Issuing, locating, validating, renewing, and revoking certificates.
|
|
Which should be used as a replacement for Telnet for secure remote login over an insecure network?
|
SSH
|
|
Which would best describe a Concealment cipher?
|
Every X number of words within a text, is a part of the real message.
|
|
Which of the following can best define the "revocation request grace period"?
|
Time period between the arrival of a revocation request and the publication of the revocation information
|
|
Which is defined as a key establishment protocol based on the Diffie-Hellman algorithm proposed for IPsec but superseded by IKE?
|
OAKLEY
|
|
SKIP is a key distribution protocol
|
Hybrid encryption to convey session keys that are used to encrypt data in IP packets.
|
|
How long is a DES key sequence?
|
8 Bits
|
|
What is another known for a Parity Key
|
Key Sequence?
|
|
Which is a protocol used to enable two users using symmetric encryption to exchange a secret key (session key) over an insecure medium without any prior secrets? The negotiated key will subsequently be used for message encryption.
|
Diffie_Hellmann
|
|
The Diffie-Hellman key agreement protocol is also called
|
The Exponential key agreement
|
|
The Diffie-Hellaman protocol has two system parameters p and g.
|
They are both public and may be used by all the users in a system. Parameter p is a prime number and parameter g (usually called a generator) is an integer less than p, with the following property: for every number n between 1 and p-1 inclusive, there is a power k of g such that n = gk mod p
|
|
The Deffie-Hellman protocol depends on the
|
Discrete logarithm problem for its security. But The Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack
|
|
Which of the following would best describe a Concealment cipher?
|
Every X number of words within a text, is a part of the real message.
|
|
Which identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?
|
Rijndael
|
|
Rijndael is the new approved method of
|
Sensitive but unclassified information for the U.S. government. and is also widely used in the public arena as well.
|
|
Rijndael (for AES) has
|
Low memory requirements and has been constructed to easily defend against timing attacks.
|
|
What can be defined as a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity?
|
A digital signature
|
|
What can be defined as a digital certificate that binds a set of descriptive data items, other than a public key, either directly to a subject name or to the identifier of another certificate that is a public-key certificate?
|
An attribute
|
|
A public-key certificate binds a
|
Subject name to a public key value, along with information needed to perform certain cryptographic functions.
|
|
What is related to a Public key infrastructure (PKI)?
|
- A Certificate authority
- A Registration authority - A X.509 certificate |
|
A Ticket Granting Service is a part of
|
Kerberos and not PKI
|
|
PKI provides
|
Authentication, confidentiality, nonrepudiation, and integrity of the messages exchanged.
|
|
PKI is a
|
Hybrid system of symmetric and asymmetric key algorithms and methods.
|
|
Which DES modes can best be used for authentication?
|
Cipher Block Chaining and Cipher Feedback.
Because both Cipher Block Chaining and Cipher Feedback create a key that is dependent of the previous block and the final block serves as a Message Authentication Code |
|
Electronic Code Book (ECB) is basic
|
Encryption method that provides privacy but not authentication.
|
|
Which techniques is used in the ENCRYPTION of data between a web browser and server?
|
SSL
|
|
You've decided to identify the agent who initiated any particular transfer. You can do this by:
|
Having the agent encrypt the hash with his private key.
|
|
Why does a digital signature CONTAIN a message digest?
|
To detect any alteration of the message
|
|
What is the role of IKE within the IPsec protocol?
|
Peer authentication and key exchange
|
|
What is the range of SSL (Secure Sockets Layer) 'session key' lengths?
|
40 bit to 256 bit
|
|
What is the maximum key size for the RC5 algorithm?
|
2040 bits
|
|
Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?
|
IPsec and L2TP
|
|
What is the main problem of the renewal of a root CA certificate?
|
It requires the authentic distribution of the new root CA certificate to all PKI participants
|
|
Secure Sockets Layer (SSL) provides security services at which layer of the OSI model?
|
Transport Layer
|
|
What is called the standard format that was established to set up and manage Security Associations (SA) on the Internet in IPSec?
|
Internet Key Exchange (IKE)
|
|
Which of the following algorithms is used today for encryption in PGP?
|
IDEA
|
|
The Diffie-Hellman algorithm is used for:
|
Key agreement
|
|
Compared to RSA, which of the following is true of Elliptic Curve Cryptography(ECC)?
|
It is believed to require shorter keys for equivalent security.
|
|
Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?
|
Birthday attack
|
|
Key management protocol are?
|
- ISAKMP
- Diffie-Hellman - KEA |
|
The Data Encryption Algorithm performs how many rounds of substitution and permutation?
|
16
|
|
Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what purpose?
|
Message integrity.
|
|
Which of the following OSI layers provides non-repudiation services?
|
Application layer
|
|
ExampleS of a block cipher
|
- Skipjack
- IDEA - Blowfish |
|
RC4 is NOT a
|
Block Cipher
|
|
Algorithms used in Rijndael
|
- Non-linear layer
- Key addition layer - The linear mixing layer |
|
What is the RESULT of a hash algorithm being applied to a message ?
|
A message digest
|
|
Which of the following techniques is used in the ENCRYPTION of data between a web browser and server?
|
SSL
|
|
Symmetric Key Algorithm is also known as
|
- Secret Key
- Private Key - Single Key - Shared Key - One Key |
|
A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
|
Verifying signed messages
|
|
A one-way hashing function does NOT
|
Authentication & Confidentiality.
|
|
A one way hashing function can only be use for the
|
Integrity of a message
|
|
Attributes pertaining to PPTP (Point-to-Point Tunneling Protocol
|
- PPTP is able to only handle IP networks.
- PPTP does not provide strong encryption - PPTP does not support any token-based authentication method for users. |