Preview

Modern Cryptographic Protocols in Fixed and Mobile Communication.

Powerful Essays
Open Document
Open Document
2890 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Cryptographic Protocols in Fixed and Mobile Communication.
Introduction
They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.
Secure Socket Layer (SSL):
SSL protocol is a cryptographic protocol used for establishing a secure communication channel between two entities (Martin, 2012). Secure socket layer operates at the transport layer of the internet protocol suite. Though SSL provides transport layer security, it site immediately above Transmission Control Protocol (TCP) in the protocol stack, therefore it can be said that the SSL provides session layer security in the OSI model (Kak, 2012). SSL was developed by Netscape in 1995 and was used with the Navigator browser; it was developed to provide secure authenticated connection between client\browsers and servers (Martin, 2012). Later Internet Engineering Task Force (IETF) took its responsibility.

The SSL protocol has three basic properties:
a. Symmetric cryptography is used to encrypt data and public key cryptography is used to establish symmetric key (Freier, Karlton & Kocher, 2011).
b. Peer’s identity is authenticated using digital signatures.
c. Data origin authentication and peer authentication is checked using a keyed Message Authentication Code (MAC). Secure hash functions are used as components of MAC’s and digital signatures.
The goals of SSL protocol in order of their priority are:
a. Cryptographic security: SSL is used to establish secure communication channel between a client and a server (Freier, Karlton & Kocher, 2011).
b. Interoperability: different programmers should be able to develop their application



References: Dierks, T. and Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc5246 Frankel, S Freier, A., Karlton, P., & Kocher, P., (2011, August). The secure sockets layer (SSL) protocol version 3.0. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc6101 Harris, S Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf Manangi, S Martin, K. M. (2012). Everyday cryptography: Fundamental principles and applications. Oxford, New York: Oxford University Press. Rescorla, E. and Schiffman, A. (1999). The secure hypertext transfer protocol. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc2660 Rhee, M Tilborg, H. (2002). Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers. Yloven, T. & Lonvick, Ed. C. (2006). Secure shell (SSH) protocol architecture. Internet engineering task force. Retrieved from: http://www.ietf.org/rfc/rfc4251.txt

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    University of Phoenix. (n.d.). Service Requests Web Links. Academic Materials and Tools. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/cist/libraries/sitemap.htm…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Cited: Abdulhayohlu, M. (1998, UNK UNK). Instant SSL by COMODO. Retrieved from Instant SSL by COMODO: http://www.comodo.com…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    3. Conklin, W., & White, G. (2010). Principles of Computer Security (2nd ed.). Chicago, IL: McGraw-Hill.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Simple Des

    • 2230 Words
    • 9 Pages

    is an educational rather than a secure encryption algorithm. It has similar properties and structure…

    • 2230 Words
    • 9 Pages
    Good Essays