Software Security The gateways provide cryptographic protection. Gateway A provi
ID: 3690471 • Letter: S
Question
Software Security
The gateways provide cryptographic protection.
Gateway A provides WPA2 crypto protection.
Gateways B and C provide IPsec crypto protection for traffic between Site 1 and Site 2. They provide no crypto protection between other Internet destinations.
Kevin has captured crypto keys and he will use them to decrypt an email sent between Host A and Host C and intercepted on the Internet. Which crypto keys will help him? Answer Yes or No to each of the following keys and briefly explain the reason.
a. Keys for Gateway A
b. Keys for Gateway B
c. Keys for Gateway C
Explanation / Answer
a)
keys for Gateway A is pre-shared key(PKE)
- which is a shared serect key used between the channels using some secured channel.To build a key from shared secret, the key derivation function is typically used. Such systems almost always use symmetric key cryptographic algorithms. The term PSK is used inWi-Fi encryption such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), where the method is called WPA-PSK or WPA2-PSK, and also in the Extensible Authentication Protocol (EAP), where it is known as EAP-PSK. In all these cases, both the wireless access points (AP) and all clients share the same key.
b)
keys for Gateway B is a Internet Key Exchange (IKE)
- which is a key IPsec is a standard based security architecture for IP hence IP-sec.
IKE (Internet Key Exchange) is one of the ways to negotiate IPsec Security Associations (SAs), in particular case ISAKMP (implementation of IKE) is what Cisco uses.
Currently two versions of IKE exist:
This document focuses mostly on IKEv1 and crypto map configuration, however most aspects are true for other types of frameworks.
c)
The used for Gateway B and Gate way C are same. That is in Gateway C also we can use key as Internet Key Exchange (IKE)
-which is a key used in IP sec for protection of network.
Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocoland ISAKMP. IKE uses X.509 certificates for authentication - either pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to set up a shared session secret from which cryptographic keys are derived.In addition, a security policy for every peer which will connect must be manually maintained.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.