Security of Computer Network

Network Secutity
ComputerNetwork Security

One of the most important automated tools for computer network security is encryption. Encryption is a process that conceals meaning by changing intelligible messages into unintelligible message. Encryption can be by means of the following two systems:

code: A code system uses a predefines table or dictionary to substitute a meaningless word or phrase for each message or part of message.

Cipher: A cipher used a computable algorithm that can translate any stream of message bits into an unintelligible cryptogram.



Conventional Encryption
The original message, referred to as plaintext, is converted into apparently random nonsense, referred to as ciphertext. The encryption process of an algorithm and a key. The key is a relatively short bit string that controls the algorithm. The algorithm will produce a different output depending on the specific key being used at the time. Changing the key radically changes the output of the algorithm.

Conventional Encryption

Once the ciphertext in produces, it is transmitted. Upon reception, the ciphertext can be transformed back to the original plaintext by using a decryption algorithm and the same key that was used for encryption.
The security of conventional encryption depends on the security of the key, not the security of the algorithm secret; we only need to keep the key secret. With the use of conventional encryption, the principal security problem is maintaining the secrecy of the key.
 



Authentication using conventional encryption:
It is possible to perform authentication simply by the use of conventional encryption. If we assume that only the sender and receiver share a key, then only the genuine sender would be able to successfully encrypt a message for the other participant. Furthermore, if the message includes an error-detection code and a sequence number, the receiver is assured that no alteration have been made and that sequencing is proper. If the message also includes a time stamp, the receiver is assured that the message has not been delayed beyond that normally expected for network transit.

Public-key encryption:

Public-key encryption


In public-key encryption, the algorithm uses one key for encryption and a companion but different key for decryption. The technique works as follows:
  • Each end system in a network generates a pair of keys to be used for encryption and decryption of message that it will receive.
  • Each system publishes its encryption key by placing it in a public register or file. This is the public key. The companion key is kept private.
  • If sender wishes to send a message to receiver, it encrypts the message using receiver's public key.
  • When receiver receives the message, it decrypts it using private key. No other recipient can decrypt since only receiver knows the private key.

 
Message Authentication:
A message, file, document or other collection of data is said to be authentic when it is genuine and came from its alleged source. Message authentication is a procedure that allows the communicating parties to verify that received messages are authentic. 


Message Authentication Code:

One authentication technique involves the use of a secret key to generate a small block of data , known as message authentication code, that is appended to the message. This technique assumes that two communicating parties, say A and B, share a common secret key KAB. When A has a message to send to B, it calculates the message and the key: MACM = F(KAB, M). The message plus code are transmitted to the intended recipient. The recipient performs the same calculation on the receives message, using the same secret key, to generate a new message authentication code. The received code is compared to the calculated code. If we assume that only the receiver and the sender know the identity of the secret key, ans if the receives code matches the calculated code, then

  • The receiver is assured that the message has not been altered.
  • The receiver is assured that the message is form the alleged sender.
  • If the message includes a sequence number, then the receiver can be assured of the proper sequence.
 

Related Post:

Offline Google Maps for Android

Computer Networks Architecture: The TCP/IP protocol suite

Computer Network Architecture: The OSI Model

Network Architecture: Protocol

Computer Networks: Network Topology

Intorduction to Computer Networks: Types of Computer Networks

 

Comments

  1. Computer and network security have become increasingly important issue across all industries or world. From protecting corporate networks from malware, hackers, and denial of service attacks to securing government networks from cyber espionage and cyber terrorism, modern network admin..
    _____________________
    ultimate pet websites


    ReplyDelete

Post a Comment