logo

Compare and contrast three data encryption standards for WiMAX networks?

   

Added on  2020-03-23

4 Pages1773 Words49 Views
Task 1.Compare and contrast three data encryption standards for WiMAX networks?IBMdesignedupthe infocryptographycustomary(DES) figurethatwasthoroughbredas agovernmentcustomaryin1976.Theinfocryptographycustomaryformula(DEA),aneasyFiestelpreparepiece figure, utilizes afifty sixbit key length andsixty fourbitsq.size. DESfigure remaineda regularamong the U.S. Government andcompletely differentgovernmentsroundtheglobetillthe purposethat itfinishedup plainly conceivableto interruptingunderneathtwenty fourhours utilizing basic savage power assaults.During thismanner, DES is presentlythoughtofobsoleteandfewersecure.WithaselectedfinishgoaltoboostDES,IBMdesigneduptheTripleencodingcustomary(TDES)within thelate 1970's. The Tripleencodingformula(TDEA)thatmay well bethought ofasthricetheDrug Enforcement Agency, replacessixty fourbitkeysusedasa sectionof DES with 192 bits. Thisa lot ofdrawn out key lengthoffersa viableresistance against a savage power assault and in spite of being hypothetically crackin aposition,it'sundoubtedlynot handyto interruptTDES utilizinggiftday innovation. Therefore,aninfamyofbeinggenuinelysecuredhassettledonthatacurrentcalltomethodcashconnectedexchanges.Ron Rivestdesignedup the "Rivest Cipher" or RC2cryptographycalculation in 1987thatutilizesasixty fourbit piece size and variable key length. RC2 wasat firstcreatedfor Lotus to beusedasasectionof their Lotus Notes informing programming. RC2 was suited to itschanceand stayed mysterybeforereaching tobeovertlyaccessible overthe net. RC2may besplit with 234 pickedplaintexts,during thismanner, itsstandingas ain good ordereffectivelybustfigure makes itunacceptable for currentcryptographywants.FeaturesDESTripleDESRC2Created ByIBM 1975IBM 1978Ron Rivest 1987Block size64 bits64 bits64 bitsAlgorithm StructureFeistel NetworkFeistel NetworkSource heavy FeistelNetworkKey Size56 bits112 bits64 bits by default, 8-128bits in step of 8 bitsCracked?YesNoYesRounds164816 mixing, 2 mashingSuitability to WiMaxYesYesYesCurrently used by802.16eYesYesNoExisting CracksBrute force attackTheoretically possibleRelated Key attackTable 1. Comparison of three encryption standards for WiMax2.Research the security challenges for any two examples of WPAN technologies.
Compare and contrast three data encryption standards for WiMAX networks?_1
WPAN Technologies:Remote Network is a remote development which empowers particular frameworks to bestow, using standardtraditions remotely. The term is most customarily used as a piece of communicate correspondences composewhose connections in between centre points are developed without the spaghetti of wires. Remote communicatecorrespondences frameworks are generally executed with some sort of remote information transmissionstructure that jobs electromagnetic waves, for instance, radio waves, for the transporter and this use by and largeoccurs at the physical level or "layer" of the framework. In this dynamic world we will discover diverse sorts ofremote system. Each of them is vital and has an immense commitment in their separate field. A few systems arefor short range and a few are for Wide range, some gives low information rate and some gives high informationrates. Additionally the greater part of the innovations can be conveyed as self – sorting out, self – recuperating.There are bunches of verities of remote system that relying upon the application, cost and usefulness client canget any of them. In the following segment a concise warm-up presentation of various remote advances is given.Remote individual region systems are short separation remote systems that have been particularly intended forinterconnecting versatile and portable registering gadgets, for example, cell phones, Laptops, PDA's, pagers andvarious other shopper hardware gadgets. Regularly, this sort of systems utilizes some innovation that grantscorrespondence inside around 10 meters - as such, a short range. The IEEE 802.15 standard characterizes detailsfor the media get to control and physical layers for the remote gadgets in WPANs.Bluetooth The Bluetooth is an IEEE 802.15.1 standard for short-extend arrange innovation which keeps on getting acharge out of quick appropriation in an assortment of data gadgets. As engineers turn out to be more open tomaking Bluetooth-empowered applications, the cost of Bluetooth radio handsets keeps on falling. Presently dayswe will discover various gadgets like cell phone, PDA's, tablets are all Bluetooth empowered. SecurityBasically, there are 3 different methods of security to access Bluetooth between 2 gadgets. Following aresecurity modes: Mode 1: no security, Mode 2: benefit level upheld security Mode 3: connect level upheld security In security mode 1, Bluetooth gadgets can interface with the others without verification. In security mode 2,security methods are started after a channel is built up at the coherent connection control and adjustmentconvention (L2CAP) level. In this mode, Bluetooth security administrator {link chief) deals with all entrance toadministrations and gadgets. In conclusion, in security mode 3, both validation and classification is bolstered.Security methods are started before channel is built up. In addition a mystery connect key is shared by a coupleof gadgets for secure correspondence, in this mode.RFID
Compare and contrast three data encryption standards for WiMAX networks?_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The WiMAX Technology: A Wireless Communication Protocol
|17
|2296
|458

Assignment on Wireless Communications
|14
|1453
|183

The Wireless Networks Technology (Doc)
|7
|1637
|257