Reading Note on Chapter 7 (Confidentiality using Symmetric Encryption)

 

·         Read 7.1.

§  What are the points of confidentiality violation?

§  What is the difference between link and end-to-end encryption? What are advantages and disadvantages of each?

§  Look at table 7.1.

§  What is the implication of encryption in store-and-forward communication?

§  What is the drawback of application layer encryption? How to solve this?

§   

·         Read section 7.2.

§  Is it possible for an attacker to perform traffic analysis even if packet headers are encrypted? Why or why not?

§  What is traffic padding? Why is it useful?

·         Read section 7.3 in details.

§  What is the significance of key distribution?

§  What are the challenges for a key distribution?

§  What is hierarchical key control? What is its significance?

§  Read about session key lifetime.

§  Read about transparent and decentralized key control schemes.

·         Read section 7.4 briefly.

§  What is cryptographically generated random number?

§  What is its significance?