Review Questions

Link encryption happens between links in this way it is much harder to determine the source and destination because routing information is encrypted between each link. However the message is still vulnerable at the switches themselves, so you need end-to-end encryption to guarentee that switches not under your controll are not releasing the message.

For more see Table 7.1 Characteristics of Link and End-to-End Encryption

Traffic padding produces ciphertext output continuously, even in the absence of plaintext. This makes it impossible for an attacker to distinguish between true data flow and padding and therefore impossible to deduce the ammount of traffic.

A master key is used by a key distribution center to encrypt and deliver a temporary session key that is used to communicate between parties.

A word ocurring, invented, or used just for a partiuclar occasion. In this case the occasion is to keep track of which response goes to which request - a book keeping take.

A key distribution center is a trusted third party that handles the distribution of session keys.

Randomness:

Unpredictability: When generating pseudorandom numbers you will not have independence but you need unpredictability as well as adherence to a uniform distribution.

Csce877Ch7Notes (last edited 2005-10-16 20:17:47 by yakko)