The Wireless Networks Technology (Doc)

Added on - 28 Mar 2020

  • 7

    Pages

  • 1637

    Words

  • 87

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Running head:WIRELESS NETWORKSWireless NetworksName of the StudentName of the UniversityAuthor’s note:
1WIRELESS NETWORKSTask 1:3 Data Encryption Standards for WIMAX NetworksDES: DES is the short form for Data Encryption Standard. The technology is utilized asthe primary guidelines for the procedure of information encryption (ISLAM & AZAD, 2014).The symmetric nature of the information encryption standard includes the advancement of theprocedure of encryption for the information management by utilizing the keys. The sender isconstantly told about the key that is used in encryption for the DES processing before theexecution for the encryption procedure. Regularly the extent of data encryption key utilized byDES is 64 bits. Be that as it may, the real accessible size for the key of DES encryption is 56 bitsjust as the rest of the 8 bits are left for parity analysis for the information models. DESencryption was produced and planned by IBM. The DES encryption is an open standard for theencryption procedure of the information and data.AES:AES stands for Advanced Encryption Standard. The AES is a piece symmetricinformation standard (Karthik & Muruganandam, 2014). The ramifications of the propelledinformation gauges are utilized for framing the piece encryption in the association. TheAdvanced Encryption Standard is exceptionally useful for the following the encryption standardsfor the most secured operations that is implied by the US government too. The US governmenthad picked this standard for the improvement of the insurance of the arranged and private data.The AES encryption process utilizes indistinguishable keys for implementation of improvementof encryption and information assurance. The benchmarks of the encryption can acknowledgethe information obstruct for encryption having length of 128 bits. Among the processes the 3keys utilized for the encryption are 128 bits, 192 bits, and 256 bits long individually (Bhanot &Hans, 2015). The AES procedure of encryption includes the handling of the entire piece
2WIRELESS NETWORKScomprising of information in a parallel way to use the substitution method and stages for eachround.Triple DES:As opined by Barker and Barker (2012), the technology of Triple DES is achanged and advanced type of Data Encryption Standard utilized for the procedure of encryption.The system of encryption utilizing Triple DES encryption procedure would include theutilization of 3 isolate keys for the effective completion of the encryption. The calculationutilized for Triple DES encryption incorporates the use of the DES thrice to secure theinformation and data. The keys utilized as a part of the Triple DES encryption comprise of threebits size and it can be utilized for encryption of the information. The first (56 bits) and third key(168 bits) is utilized for encoding the information. Be that as it may, the second key (112 bits) isutilized for decoding of the information.Task 2: Security Challenges of WPAN TechnologiesSecurity Issues for using Bluetooth: Bluetooth is a propelled innovation for exchangingof document and media by utilizing the Bluetooth infrared information exchange (Padgette,2017). However the innovation had been confronting many issues and difficulties of security likeBluejacking, Bluesnarfing assault, and Backdoor Hacking. The Bluejacking is the procedurewhen the programmers effectively execute the wholesale fraud for separating essential data fromthe framework gadgets (Minar and Tarique, 2012). The Bluesnarfing assault contains event ofthe assault in the Bluetooth arrange by the way toward hacking. The programmers in thissituation hack into the system of Bluetooth of accessing the classified and private informationand data for their own advantages. The Backdoor Hacking is the risk to the Bluetooth innovationfor the abuse of the vulnerabilities that are present in the framework. The programmers penetrate
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document