Preview

Socket Programming

Better Essays
Open Document
Open Document
1413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Socket Programming
A Brief Introduction Network Programming and Encryption
Rich Lundeen

Introduction
This paper is the report of an exercise in socket programming and encryption. The objectives of this project were as follows:
● ● ● ●

To create two programs, a client and a server The server broadcasts its public key to all who connect A client attaches to the server and exchanges a session key using public key encryption A message is passed between the client and the server encrypted with a symmetric key

There are weaknesses in this scheme. There is no real authentication to speak of. On the other hand, something like this could be considered useful, especially if the server's public key were verified with a fingerprint locally. It would also be fairly trivial to extend the already trivial program so that it authenticates with a special and specific CA. There are many similarities with this scheme and how ssl or other "real" cryptographic techniques work. Many times, public key encryption is only used to transfer a key to be used with symmetric cyphers which are much more computationally fast. Not all source code is included here (although most the interesting source code is). To view the complete source code, download it from http://webstersprodigy.net/media/code/networkproject.tar.gz .

Specifications
For a socket API, I chose the Berkely model since it seems to be the standard (although Java Sockets and Winsock are fairly popular as well, they resemble the Berkely model). As a programming language I chose Python. At this level efficiency was not nearly as important to me as readability and programming ease. I chose to implement RSA as the public key algorithm, and wanted to do this from scratch. I made the decision to write the cryptography algorithms from scratch anticipating that truly random numbers and big integers would provide important insight into some of the facets of cryptography, and I was not mistaken. I chose RSA (as opposed to other probably superior

You May Also Find These Documents Helpful

  • Good Essays

    Nt1110 Unit 3 Assignment

    • 655 Words
    • 3 Pages

    Here, Raspberry Pi will act as a server which will open a socket on a specified port which will wait for the incoming connection from the client machine once the connection is established it will send and receive messages and the connection will termi-nate only when the client side application exits. As mentioned earlier it is similar to a simple chat server where the client ma-chine will send some instructions as messages and the Pi will send acknowledgment or error message as message only. One thing that should be kept in mind here is that in the case of an error the server side code should not terminate. Now from here code can be further divided into five parts i.e.:…

    • 655 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 20 lab

    • 284 Words
    • 2 Pages

    6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Mail – SMTP – Mail Message Formats and MIME – DNS – Socket Programming with TCP and…

    • 25392 Words
    • 102 Pages
    Good Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    How does it comfort remote users to achieve their goal? Focuses on history of PPTP and how Microsoft implemented the protocol in Windows NT 4.0 Structure and message format of PPTP is detailed like PPTP as an extension of PPP is not similar to it. PPTP is the layer2 of OSI model. PPTP secures PPP through encryption and enclosing. PPTP server interfaces on internet and intranet. How PPTP is used as a protection device for data and is safe to transmit sensitive data in an encrypted format (Yates, 1997). Message format and types of messages. All the services which PPTP provides and its working style. Types of deployment in PPTP are discussed. PPTP supports client server model. Technical specification of PPTP is detailed in RFC 2637.…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Mateti, P. (2006). TCP/IP Suite. In Bidgoli, H. (Ed.), Handbook of Information Security. Bakersfield, California: John Wile & Sons, Inc.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    “In violent crimes experienced by American Indians where use was known, 48% of the offender was under the influence of alcohol, 9% were under the influence of drugs, or 14% were under the influence of both.” Says the Bureau Of Justice Statistics. Alcohol related violence is a big problem on Native American Reservations around the country and it is up to us to stop it.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Code Of Conduct 2012

    • 192 Words
    • 1 Page

    In the Code of Conduct 2012, certain values and principals have been put in place to help the nurses carry out professional conduct in practice. There are eight principals which have been based on the four underlying values of ethical nursing; respect, trust, partnership and integrity. The fourth principle of the code instructs RNs to ‘Maintain health consumer trust by providing safe and competent care’. In 4.5 of this principle, nurses are strongly advised to ask for advice and assistance from colleagues whenever the care of a patient may be compromised by either a lack of knowledge or skill (NCNZ, 2012). This standard related to Jo because in her situation she lacked knowledge and the right to prescribe. Instead of taking the situation into…

    • 192 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Given a computer network for data transmission, identify and analyze the possibilities for loss or modification of data and demonstrate techniques to safeguard data from loss, modification or improper disclosure during transmission by using encryption, digital signatures, cryptographic seals and time stamp techniques and describe how they provide the elements of secrecy, authenticity, detection of modification and detection of reuse of the transaction data.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays