logo

Security in Cryptography | Assignment

7 Pages1502 Words13 Views
   

Added on  2022-09-12

Security in Cryptography | Assignment

   Added on 2022-09-12

ShareRelated Documents
Running head: SECURITY IN CRYPTOGRAPHY
SECURITY IN CRYPTOGRAPHY
Name of the Student
Name of the University
Author Note
Security in Cryptography | Assignment_1
SECURITY IN CRYPTOGRAPHY1
IPsec and TLS security protocols Importance, Purpose and Real-life
Application
IPsec
IPsec (Internet Protocol Security) provides a framework for assured secure and private
communication over internet using cryptographic security. It is easily deployable for the existing
networks as it does not requires changes in codes or the protocols. Its main purpose is to provide
direct access of the central network to a remote computer. These remote computer users have all
the access for storage locations of the files, programs, backups over that network. To secure the
network from the more outside connections, it provides encryption by scrambling the data which
cannot be intercepted or deciphered (Tiller, 2017). Only the correct mathematical key can
decipher the encryption. The key negotiation overhead is reduced and simplified by supporting
the IKE protocol where the automatic key negotiation and IPsec security association (SA) is
provided. All IP-based application system can use IPsec without modifying the compatibility,
system and services. Per-packet encryption provides the flexibility and enhances the security. It
guarantees the highest levels of possible security in application level.
Function and Real-world application
In Real-world applications, IPsec has been doing its work in the numerous areas along with the
E-mail services, Web Access HTTP secured (Shah & Parvez, 2015). The companies can secure
the network using IPsec and disallowing the access to untrusted sites, limiting the encrypted
packets to leave the network boundary, implementing authentications to the data packets and
users. VPN implementation is also comes in IPsec Protocols.
Security in Cryptography | Assignment_2
SECURITY IN CRYPTOGRAPHY2
TSL
On another hand, TLS (Transport Layer Security) is a protocol which uses cryptographic
techniques to provide the secure end-to-end communications. It is used to prevent
eavesdropping, massage forgery and tampering for security. Currently it is the predecessor of
Secure Socket Layer (SSL) (Oppliger, 2016). It defines two layers of specification where it uses
the handshake between the client and server for the authentication and exchange security keys
before data transmission. It is a multi-step process.
Function and Real-world application
It is widely used in internet communications and during online transactions. It provides
authentication, data integrity and privacy over connecting between two computer applications. In
web browsers, applications and data exchanging software, remote desktop, VoIP (Voice over IP)
VPN connections etc. the TSL protocol is implemented. MD5, hashes, RC4 etc. are widely used
cryptographic techniques in TSL protocols.
Reason for performing AH protocol after the ESP protocol
IPsec is having two modes of operating: one is transport and another is tunnel mode
along with two protocols ESP (Encapsulating Security Payload) and AH (Authentication
Header). AH provides the packet authentication, where the ESP provides encryption of results
(pad length, next header, padding and payload data) using keys, encryption techniques along
with the authentication. Data integrity in AH protocol is assured by using the algorithms such as
HMAC-SHA or HMAC-MD5 which generates message digest (Rao et al., 2015). Originality of
the data is ensured by sharing secrete key between the client and the server. Here the complexity
of the mechanism gets increased as the two protocols trying to authenticate a single packet. ESP
Security in Cryptography | Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Applications and Significance
|8
|1128
|307

VPN Technologies and Security
|9
|2031
|99

Engineering and Computing Master of Science
|6
|4182
|211

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Virtual Private Network (VPN) Report 2022
|14
|2220
|21

SSL/TLS VPN Technologies for Secure Network Connection
|8
|2000
|419