logo

Deep Packet Inspection and Stream Analysis

   

Added on  2020-03-01

6 Pages2152 Words151 Views
 | 
 | 
 | 
TOPIC 3SYMMETRIC KEY ENCRYPTION: Symmetric key Encryption is the type of encryption wherein identical key is used for encryption and decryption of the message. Both the participants’ i.e the sender and the recipient uses the same symmetric key to achieve secure communication. It is oldest and simplest form of encryption.AES-128,AES-192 and AES-256 are the most commonly used symmetric algorithm and U.S. Department of Defence’s Data Encryption Standard(DES) being the best known. Symmetric key encryption is simpler and quicker however their major shortcoming is that the two ends must guarantee to swap over the key in a safe way. In this way of sending messages, it is a must that one knows which system will be exchanging dialogue with one another so that the key can be installed at each end safely (SSL Information. 2016). Source: https://www.ibm.com/support/knowledgecenter/en/SSB23S_1.1.0.13/gtps7/s7symm.htmlPUBLIC KEY ENCRYPTIONPublic key cryptography is a type of encryption which uses dual mathematically connected but not indistinguishable keys, they are public and private keys. Here the public key encrypts the data and the private one decrypts which makes it dissimilar to the symmetric form of encryption. The receiver of the memo will acquire an exclusive depiction key which is knownas the secret key as well. The encryption key published by the receiver is known as the publickey. The public key encryption are of three types namely, RSA Cryptosystem , EiGamal Cryptosystem and Elliptic Curve Cryptography. Thus it is a system wherein the encryption can happen only if the public key is present and decryption can happen only when the private key is available (Beal 2017). Thereby it is not possible at all to construe the private key even if a person is aware of the public key.
Deep Packet Inspection and Stream Analysis_1

HASHINGHashing is a conversion of a twine of characters into a generally fixed-length value of a short nature or key that signify the unique sequence. Hashing is used to key and recover objects from a record since it is quicker to search the objects with the help of a shorter hashed key than to search for the same with the help of the unique value. Hashing is also used in various encryption algorithms. It is popularly known as the hash function. Apart from helping in quicker retrieval of data, the said function also helps to encrypt and decrypt digital signatures (Technopaedia.com. 2017). The hash function is used to index the unique key and then is used later each time the information correlated with the value or key is to be regained. Therefore it can be concluded that hashing is a one way operation. Hence it can be rightly said that hashing is one of the best ways to ensure safety during the procedure of transfer of messages when the particular message is meant for a specific receiver only. There is a formula which is used for generation of the hash, which in turn lends a solution towards protecting the safety of the communication from unofficial admittance (Rouse 2015). After understanding the above three terms, it is very clear that symmetric key encryption is used for maintaining authentication and confidentiality of databases. As the said method helps to maintain confidentiality by ensuring that the data is not leaked in between transmission stage. Further even if the same is leaked, the leaker or the hacker will not be able to interpret the meaning due to encryption technology. With regards authentication also symmetric key encryption is best as it simply means that access and authorisation is given only to that person who has the password and the key for decrypting the database.REFERENCES:Beal,V. (2017). Public-key encryption. Retrieved from http://www.webopedia.com/TERM/P/public_key_cryptography.htmlRouse,M. (2015).Hashing. Retrieved from http://searchsqlserver.techtarget.com/definition/hashingSSL Information. (2016). Symmetric vs. Asymmetric Encryption – What are differences?Retrieved from https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
Deep Packet Inspection and Stream Analysis_2

Technopaedia.com. (2017). Hashing. Retrieved from https://www.techopedia.com/definition/14316/hashingTOPIC 5Computers and laptops have become a very crucial part of everybody’s life, be it any organization or for personal use. However with regards the organisations, the entire system ofworking with computers and laptops is not as simple as it seems. It is of a complex nature simple because the system of any organization does not work independently, rather it works in conjunction with the entire organization. Being a part of the security administrator, it is very crucial as well as essential to draft a proper way out for securing the assets of the organization. One of the most important part of the job is to have access control. There are various rules which one has to comply with while working in secure areas. They are enlisted below:1.Access control being one of the primary rules wherein the accessibility is not made available to all and the authorisation for the usage of the system or entering the securearea is given to only a few who are trusted and have the adequate authority. 2.Second most important rule pens down to the fact that the important and critical documents and data should be secured with the help of strong passwords which wouldmake unauthorised access difficult or impossible in certain cases.3.Being a security administrator, simply writing down the security rules would not suffice or conform to the security of the data of an entity. Adequate training has to be provided on a frequent basis (National Centre for Education Statistics. 2017).4.Backups should be taken for all the crucial information as a loss of any would not leadto incurrence of much cost to the company.5.The security administrator should ensure that the firewalls are adequately installed and they are updated on a timely basis.
Deep Packet Inspection and Stream Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents