Network Security

Table of Contents

  1. Abbrevations
    1. A
    2. B
    3. C
    4. D
    5. E
    6. F
    7. G
    8. H
    9. I
    10. J
    11. K
    12. L
    13. O
    14. M
    15. N
    16. P
    17. R
    18. S
    19. T
    20. U
    21. V
    22. W
    23. Z
  2. Definitions
  3. Links
    1. Certificates
    2. Authentication and Authorization
      1. Multifactor Authentication
        1. Lamport
      2. Identity Management
        1. Kerberos
        2. OAuth 2.0 and OIDC
    3. VPN + IPSec
      1. Modes and Protocols

Abbrevations

A

  • AAA: Authentication, Authorization, and Accounting
  • AAD: Associated Authenticated Data [Crypto]
  • ACME: Automatic Certificcate Management Environment [Certificate]
  • AD: Active Directory [IAM]
  • AEAD: Authenticated Encryption with Associated Data [Crypto]
  • AES: Advanced Encryption Standard [Crypto]
  • AFS: Andrew File System [IAM]
  • AID: Application Identifier [Auth]
  • AH: Authentication Header [VPN]
  • ALPN: Application Layer Negotiation Protocol [TLS]
  • AP: Access Point [Wi-Fi]
  • AuthN: Authentication [Auth]
  • AuthZ: Authorization [Auth]

B

  • BSS: Basic Service Set [Wi-Fi]

C

  • CA: Certificate Authority [Certificate]
  • CBC: Cipher-Block-Chaining-Mode [Crypto]
    • CCM: Counter-Mode with Cipher-Block-Chaining Message Authentication Code [Crypto]
  • CFB: Cipher Feedback Mode [Crypto]
  • CHAP: Challenge Handshake Authentication Protocol [Auth]
  • CN: Common Name [Certificate]
  • CRAM-MD5: Challenge Response Authentication Mechansim, Message Digest 5 [Crypto]
  • CSR: Certificate Signing Request [Certificate]
  • CTAM: Client to Authenticator Protocol [FIDO]
  • CTR: Counter Mode [Crypto]
    • CCM: Counter Mode with CBC-MAC [Crypto]

D

  • DANE: DNS-based Authentication of Named Entities [TLS]
  • DES: Data Encryption Standard [Crypto]
  • DH: Diffie-Hellman [Crypto]
  • DHCP: Dynamic Host Configuration Protocol
  • DLC: Data Link Control = Layer 2 [OSI]
  • DLP: Discrete Logarithm Problem [Crypto]
  • DNS: Domain Name System [TLS]
    • DNSSEC: Domain Name System Security Extensions [TLS]
  • DoH: DNS over HTTPS [TLS]
  • DoS: Denial of Service [Attack]
    • DDoS: Distributed Denial of Service [Attack]
  • DS: Delegation Signer [Certificate]
  • DS: Distribution System [Wi-Fi]
    • WDS: Wireless Distribution System [Wi-Fi]
  • DSA: Digital Signature Algorithm [Crypto]
  • DTLS: Datagram Transport Layer Security [TLS]
  • DV: Domain-validated [Certificate]

E

  • EAP: Extensible Authentication Protocol [Auth]
    • EAPoL: Extensible Authentication Protocol over LAN [Auth]
  • ECB: Electronic Codebook Mode [Crypto]
  • ECC: Elliptic Curve Cryptography [Crypto]
    • ECDH: Diffie-Hellman with Elliptic Curves [Crypto]
    • ECDSA: Elliptic Curve Signature Algorithm [Crypto]
  • ED25519: Edwards Curve 25519 [Crypto]
  • ESP: Encapsulating Security Payload [VPN]
  • ESS: Extended Service Set [Wi-Fi]
  • ETH: Ethernet
  • EV: Extended validation [Certificate]

F

  • FIDO: Fast Identity Online [Auth]
  • FIPS: Federal Information Processing Standard [Crypto]
  • FQDN: Fully Qualified Domain Name [TLS]
  • FTP: File Transfer Protocol [TLS]
    • FTPS: File Transfer Protocol over TLS [TLS]

G

  • GCM: Galois Counter Mode [Crypto]
  • GPG: GNU Privacy Guard
  • GSSAPI: Generic Security Service Application Programming Interface [Auth]

H

  • HBAC: Host Based Access Control [IAM]
  • HMAC: Hashed Message Authentication Code [Crypto]
  • HOTP: HMAC-based One-Time Password [MFA]
  • HSTS: HTTP Strict Transport Security [TLS]
  • HTTP: Hypertext Transfer Protocol
    • HPKP: HTTP Public Key Pinning [TLS]
    • HTTPS: Hypertext Transfer Protocol Secure

I

  • ICV: Integrity Check Value [Crypto]
  • ID: Identity
  • IEEE: Institute of Electrical and Electronics Engineers
  • IETF: Internet Engineering Task Force
  • IKE: Internet Key Exchange [VPN]
  • IP: Internet Protocol
    • IPv4: Internet Protocol version 4
    • IPv6: Internet Protocol version 6
    • IPSec: Internet Protocol Security [VPN]
  • IV: Initialization Vector [Crypto]

J

  • JWT: JSON Web Token [OAuth]

K

  • KDC: Key Distribution Center [IAM]
  • KPA: Known-plaintext Attack [Attack]
  • KSK: Key Signing Key

L

  • LAN: Local Area Network
    • WLAN: Wireless Local Area Network
  • LDAP: Lightweight Directory Access Protocol [IAM]
  • LLC: Logical Link Control [OSI]
  • L1/L2/L3: Layer 1/2/3 [OSI]

O

  • OAUTH: Open Authorization [IAM]
    • OIDC: OpenID Connect [IAM]
  • OFB: Output Feedback Mode [Crypto]
  • OCSP: Online Certificate Status Protocol [Certificate]
  • OTP: One-Time Password [MFA]
    • TOTP: Time-based One-Time Password [MFA]
    • HOTP: HMAC-based One-Time Password [MFA]
  • OV: Organization-validated [Certificate]

M

  • MAC: Message Authentication Code [Crypto]
    • Synonyms:
      • MIC: Message Integrity Code
      • MDC: Modification Detection Code
      • ICV: Integrity Check Value
    • Variants:
      • CBC-MAC: Cipher Block Chaining Message Authentication Code
      • GMAC: Galois Message Authentication Code
      • HMAC: Hashed Message Authentication Code
  • MAC: Medium Access Control [OSI]
  • MFA: Multi-factor Authentication [Auth]
  • MIME: Multipurpose Internet Mail Extensions [Mail]
    • S/MIME: Secure Multipurpose Internet Mail Extensions
  • MITM: Man-in-the-Middle [Attack]
  • MTA: Mail Transfer Agent [Mail]
    • MTA-STS: Mail Transfer Agent Strict Transport Security

N

  • NAT: Network Address Translation [VPN]
  • NIST: National Institute of Standard and Technology
  • NTP: Network Time Protocol

P

  • P2P: Peer-to-Peer [VPN]
  • PAP: Password Authentication Protocol [Auth]
  • PFS: Perfect Forward Secrecy [Crypto]
  • PGP: Pretty Good Protection [WoT]
    • GPG: GNU Privacy Guard
  • PHY: Physical Layer = Layer 1 [OSI]
  • PKCE: Proof Key for Code Exchange
  • PKC: Public Key Cryptography [Crypto]
  • PKI: Public Key Infrastructure [Certificate]
  • PLCP: Physical Layer Convergence Protocol
  • PMD: Physical Medium Dependent
  • PPP: Point-to-Point Protocol
  • PRF: Pseudo Random Function
  • PSK: Pre-Shared Key

R

  • RADIUS: Remote Authentication Dial-In User Service [Auth]
  • RNG: Random Number Generator
    • PRNG: Pseudo-random Number Generator
  • RP: Replying Party
  • RR: Round-Robin, Resource Record [DNS]
  • RSA: Rivest, Shamir, Adleman-Algorithm [Crypto]
  • RTC: Real-Time Communication

S

  • SA: Security Association [IPSec]
    • SAD: Security Association Database [IPSec]
  • SAD: Security Association Database [IPSec]
  • SAML: Security Assertion Markup Language
  • SAN: Subject Alternative Name [TLS]
  • SASL: Simple Authentication and Security Layer [Auth]
  • SCRAM: Salted Challenge Response Authentication Mechanism [Auth]
  • SHA: Secure Hash Algorithm
  • S/MIME: Secure Multipurpose Internet Mail Extensions [Mail]
  • SMTP: Simple Mail Transfer Protocol [Mail]
    • SMTPS: Simple Mail Transfer Protocol over TLS [TLS]
  • SNI: Server Name Indication [TLS]
    • ESNI: Encrypted Server Name Indication [TLS]
  • SOCKS: Sockets
  • SP: Security Policy [IPSec]
    • SPD: Security Policy Database [IPSec]
  • SSH: Secure Shell
  • SSID: Service Set Identifier [Wi-Fi]
  • SSL: Secure Socket Layer [TLS]
    • TLS: Transport Layer Security
  • SSO: Single Sign-on
  • STA: Station [Wi-Fi]

T

  • TAN: Transaction Authentication Number [MFA]
  • TCP: Transport Control Protocol
  • TGT: Ticket Granting Ticket [Kerberos]
  • TLD: Top-level Domain [DNS]
  • TLS: Transport Layer Security [TLS]
    • DTLS: Datagram Transport Layer Security [TLS]
    • TLSA: Transport Layer Security Association [TLS]
    • TTLS: Tunneled Transport Layer Security [TLS]
  • TOFU: Trust-on-first-use [TLS]
  • TOTP: Time-based One-Time Password [MFA]

U

  • UDP: User Datagram Protocol
    • DTLS: Datagram Transport Layer Security

V

  • VLAN: Virtual Local Area Network
  • VPN: Virtual Private Network

W

  • WDS: Wireless Distribution System [Wi-Fi]
  • WEP: Wired Equivalent Privacy [Auth]
  • Wi-Fi: Wireless Fidelity
  • WLAN: Wireless Local Area Network
  • WoT: Web of Trust
  • WPA: Wi-Fi Protected Access [Auth]
    • WPA-PSK: WiFi Protected Setup Pre-Shared Key [Auth]
  • WPS: Wi-Fi Protected Setup [Auth]

Z

  • ZSK: Zone Signing Key

Definitions

  • Authentication / Authentifizierung: eine Person ist authentifiziert, wenn ihre Identität festgestellt werden konnte. Das kann mithilfe von Passwörtern, Biometrischen Daten oder einfach dem Ausweis erfolgen. Authentifizierung hängt mit Authorization zusammen, da man Berechtigungen nach Personen(gruppen) vergeben möchte.
  • Authorization / Autorisierung: die Berechtigung eine Aktion tun zu dürfen oder auf eine Ressourcen zugreifen zu dürfen.
  • Confidentiality / Vertraulichkeit: der Inhalt einer Nachricht ist mithilfe von Verschlüsselung für dritte nicht mehr lesbar.
  • Diffusion: eine Verschlüsselungsoperation, bei der der Einfluss eines Klartexts auf den Cipher gestreut wird, um statistische Eigenschaften des Klartexts zu verbergen. Eselsbrücke: Diffuse = Verteilen
  • Konfusion: eine Verschlüsselungsoperation, die die Beziehung zwischen Schlüssel und Cipher verschleiert. Dafür werden Substitutionstabellen verwendet, die in DES und AES verwendet werden. Eselsbrücke: Confuse = Verwirren
  • Integrity / Integrität: der Inhalt einer Nachricht kann nicht unbemerkt modifiziert werden.
  • Non-Repudiation: eine Partei kann nicht mehr abstreiten, dass sie eine Nachricht tatsächlich gesendet hat. Das wird vor allem mit Zertifikaten sichergestellt.
  • Safety: Schutz vor Verlust von Daten, etwa durch Hardwarefehler.
  • Security: Schutz vor unautorisiertem Zugriff, etwa auf private Informationen.

Links

Certificates

Authentication and Authorization

Multifactor Authentication

Lamport

Identity Management

Kerberos
OAuth 2.0 and OIDC

VPN + IPSec

Modes and Protocols