Applied Cryptography And Analysis Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

I have made a scheme to secure your company's (Uob Manufacturing Company) networks system using Cryptographic protocols. This system uses strong Cryptographic algorithms to encrypt data to travel save on a network. But you have to scarify 15-20% performance because of heavy encryption and decryption done by both end users. With such a minor performance penalty, your data will save. I will use The Ronald Rivest's algorithm. I think RC5 is the strongest algorithm compare to other Ron Rivest algorithms that why they called RC5 as "fast symmetric block cipher". It is compatible to almost all hardware and software. However if you want to upgrade your hardware it also supports 64 bit processor. This report also includes the

Keywords:

Encryption algorithms, RC5, Uob Manufacturing Company, encryption protocol, RC2, RC4, RC5, DES, Triple DES,  TRIPLE_DES_3KEY, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

Introduction

In modern era where internet plays the main part also security comes first. Cryptography is the way or art of encryption and that is the main goal. The security in networks is very important as all valuable information travels on a network. Cryptography is used for small problem to convert into hard to understand and difficult to solve.

Cryptography allows protecting from theft or alteration, but it can also help us to do user authentication. (Kessler, 21 April 2011)

There are three main types of cryptographic schemes to full fill these goals: (Kessler, 21 April 2011)

secret key (or symmetric) cryptography

public-key (or asymmetric) cryptography

hash functions

Choosing Algorithms for Encryption:

Now a days every network related person concerning many algorithms for network security for data and valuable information. These algorithms are as follow:

DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, RC5, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

Not all algorithms are suitable for one situation. They are implementing with the level of complexity of the situation and level of how much security required. But there are some key points on based we can choose algorithm for encryption.

Performance: Sometimes strong encryptions slow down the CPU performance while weak encryption consumes fewer resources.

Key formation: Stronger the encryption is when longer the key has given.

Differences: Asymmetric encryptions are stronger then symmetric encryptions. As Asymmetric uses same key length but they affect the performance.

Password: Stronger the encryption is when longer the password has given.

The encryption of large data should use a symmetric key, and then its key should be encrypted by an asymmetric key. (Microsoft, 2000)

Comparison Encryption Algorithms:

Most of Algorithms are protecting valuable information. But each of these algorithms has different level of capabilities and complexities for security on a network like DES, tripleDES, AES, Blowfish, RC2, RC4 and Rijndael are most secure encryption algorithms in Cryptography.

For comparison on performance of these algorithms, I have concern the other resources. I have got some know source that have cryptography libraries in Crypto++. It is free and has all C++ class libraries. It includes all types of cryptography schemes coded and compile in MS Visual C++ .Net 2003. Table 1 shows the performance of the most commonly used algorithms.

Table 1 Comparison results using Crypto++

Algorithm

Megabytes(2^20 bytes) Processed

Time Taken

MB/Second

Blowfish

256

3.976

64.386

Rijndael (128-bit key)

256

4.196

61.010

Rijndael (192-bit key)

256

4.817

53.145

Rijndael (256-bit key)

256

5.308

48.229

Rijndael (128) CTR

256

4.436

57.710

Rijndael (128) OFB

256

4.837

52.925

Rijndael (128) CFB

256

5.378

47.601

Rijndael (128) CBC

256

4.617

55.447

DES

128

5.998

21.340

(3DES)DES-XEX3

128

6.159

20.783

(3DES)DES-EDE3

64

6.499

9.848

Choosing Network Protocol for Company's network:

As looking into the diagram, first I like chose wireless network and as we learnt from comparison I would like to use RC4 encryption method for wireless network diagram and discuss some key protocols used for encryption.

Wireless network

2.1 Wireless Access point (WAP):

Has this diagram shows it is wireless connection means it will use either WIFI connection or Bluetooth connection devices.

Considering this diagram the communication between manager laptop and wireless adaptor is done by wireless Access point and USB wireless adaptor is connecting other stations. Such as wireless Access point is connected with wired equivalent protocol. As I am using RC4 encryption algorithm for security protocols of 64 bit stream cipher.

RC4:

This encryption algorithm is designed by Ron Rivest for RSA security. "It is variable key size stream with byte oriented operation". It also allows random permutation. I have used RC4 to have a secured communication via WEP (Wired Equivalent Protocol). The 64 bit RC4 key stream cipher is used in WEP, because of layer two security protocol. It can let network down

3.1 Description of Wired Equivalent Privacy:

The goal is to create private wired LAN and also Wireless LAN key that will used by WEP. The key is already shared and pre-established and the basic building blocks are encryption cyclic redundancy check (CRC) And RC4

The wired equivalent protocol can be supports up to four different base keys. This can be indentified as key 0 to 3. To develop the key we will need a selected base key of 24 bit Initialization vector (IV).

3.2 Encryption details:

http://upload.wikimedia.org/wikipedia/commons/thumb/4/44/Wep-crypt-alt.svg/305px-Wep-crypt-alt.svg.png

Analysis of Network:

The company networks seems to be very sensitive because it has lot of department that are sharing valuable information and also sharing confidential data over a network. As I have seen there is a CNC programming workstation that need to be secure and encrypted. According to network diagram another important node is wireless access point and manager's laptop because manager has company valuable data and also some financial data that cannot be access by any unauthorized user so these terminals should be encrypted and secured.

Conclusion:

After deep investigation for current network and company's future enhancements. I suggest that company should be applying Ron Rivest's Algorithms that is RC4 that would be the best choice as suggested by the Ron L.Rivest also because RC4 is one of the strongest algorithm and also it is compatible for all sorts of software and hardware implementations. However the company want to enhance the network hardware it will also support the latest technology easily as the encryption is concern it is the strongest security system that most of the network supervior and developers are using it.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.