logo

Deep Packet Inspection Techniques and Applications

   

Added on  2020-02-24

13 Pages3659 Words429 Views
 | 
 | 
 | 
Running head: COMPUTER SECURITY ENGINEERING
COMPUTER SECURITY ENGINEERING
Name of the Student
Name of the University
Author Note
Deep Packet Inspection Techniques and Applications_1

2COMPUTER SECURITY ENGINEERING
Table of Contents
Topic 3 Encryption..........................................................................................................................3
Topic 4 Secure Networks.................................................................................................................5
Topic 5 Access Control...................................................................................................................7
Topic 6 Firewalls.............................................................................................................................9
References......................................................................................................................................11
Deep Packet Inspection Techniques and Applications_2

3COMPUTER SECURITY ENGINEERING
Topic 3 Encryption
Symmetric key encryption
Encryption of data has become an important part of data storage in every sphere. The
messages and files which is being sent form one person to another using the internet or any other
mode of transfer should have proper security and it must be kept in mind that the message is sent
to the actual recipient of it and not in someone else’s hands. In the method of symmetric key
encryption, there is a separate key for each of the computer system (Sindhuja & Devi, 2014). The
key is used to help in the encryption procedure and then transfer it over to the receiver of the
message using the network they are connected to. During the process of sending the message
over to the receiver of the message it is important to know which computer system is going to
interact with the message. This would mean that the key for the decryption of the message needs
to be installed into the system or else the receiver will not be able to view the message. The
drawback of using this process is that the transferring of the key is the most important aspect of
the message relay. If the key falls into the wrong hand or is sent to a wrong receiver then the
whole message system is compromised (Bashyam et al., 2015). The use of symmetric key means
that both the sender and the receiver of the message system has to know a single encryption key
which will help them to encrypt and decrypt the message and continue exchanging information.
The use of the same key is the most beneficial dorm of messaging system in the symmetric key
encryption.
Public key encryption
The method of public key encryption is often referred to as the system of cryptographic
exchange of messages with the help of two un-identical keys – a public key shared among the
Deep Packet Inspection Techniques and Applications_3

4COMPUTER SECURITY ENGINEERING
users and a private key confidential to a single person in the network (Abdalla, Benhamouda &
Pointcheval, 2016). The public key is known to everyone in the network they are connected to
and the private key is only share with the person on the receiving end of the message. The
security aspect of the use of this mode of message sharing is the generation of the private key if
someone gets to know what the public key is. Looking from the point of view of the hackers it
would be practically impossible for them to generate the private key which would help them in
decrypting the message (Xu et al., 2013).
Hashing
The use of hashing function is the available in all the applications which are using
information system as a part of their system (Lin et al., 2014). The use of this technology is
important from the point of view of the user. The technology offers security measures to the use
of the internet and thee communication medium that the user is using. The hash function is
basically a mathematical function which had the property of converting the input value into a
much more compressed value of the same type. The hashed value returned is termed as message
digest or hash value.
Technique Used For Confidentiality and Authentication
The most popular implementation of the cryptography standard is the use of Hashing.
This process can directly ensure the process of confidentiality and authentication (Xia et al.,
2014). In the world of computer system the use of confidentiality and authentication plays a very
important role from the aspect of data storage. Everyone on the same network has to keep their
data safe from the hackers and others on the same network. Two direct application of the hash
function are discusses below:
Deep Packet Inspection Techniques and Applications_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents