# Securing Networks System Using Cryptographic Protocols Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

I have made a scheme to secure your company's (Uob Manufacturing Company) networks system using Cryptographic protocols. This system uses strong Cryptographic algorithms to encrypt data to travel save on a network. But you have to scarify 15-20% performance because of heavy encryption and decryption done by both end users. With such a minor performance penalty, your data will save. I will use The Ronald Rivest's algorithm. I think RC4 is the strongest algorithm. It is compatible to almost all hardware and software. However if you want to upgrade your hardware it also supports 64 bit processor. This report also includes the

## Keywords:

Encryption algorithms, RC5, Uob Manufacturing Company, encryption protocol, RC2, RC4, RC5, DES, Triple DES, Â TRIPLE_DES_3KEY, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

## Introduction

In modern era where internet plays the main part also security comes first. Cryptography is the way or art of encryption and that is the main goal. The security in networks is very important as all valuable information travels on a network. Cryptography is used for small problem to convert into hard to understand and difficult to solve.

Cryptography allows protecting from theft or alteration, but it can also help us to do user authentication. (Kessler, 21 April 2011)

There are three main types of cryptographic schemes to full fill these goals: (Kessler, 21 April 2011)

Symmetric (secret key) cryptography

Asymmetric (public-key) cryptography

hash functions (Protocols)

## Choosing Algorithms for Encryption:

Now a days every network related person concerning many algorithms for network security for data and valuable information. These algorithms are as follow:

DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, RC5, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

Not all algorithms are suitable for one situation. They are implementing with the level of complexity of the situation and level of how much security required. But there are some key points on based we can choose algorithm for encryption.

Performance: Sometimes strong encryptions slow down the CPU performance while weak encryption consumes fewer resources.

Key formation: Stronger the encryption is when longer the key has given.

Differences: Asymmetric encryptions are stronger then symmetric encryptions. As Asymmetric uses same key length but they affect the performance.

The encryption of large data should use a symmetric key, and then its key should be encrypted by an asymmetric key. (Microsoft, 2000)

## Comparison Encryption Algorithms:

Most of Algorithms are protecting valuable information. But each of these algorithms has different level of capabilities and complexities for security on a network like DES, tripleDES, AES, Blowfish, RC2, RC4 and Rijndael are most secure encryption algorithms in Cryptography.

For comparison on performance of these algorithms, I have concern the other resources. I have got some know source that have cryptography libraries in Crypto++. It is free and has all C++ class libraries. It includes all types of cryptography schemes coded and compile in MS Visual C++ .Net 2003. Table 1 shows the performance of the most commonly used algorithms.

Table 1 Comparison results using Crypto++

256

3.976

64.386

256

4.196

61.010

256

4.817

53.145

256

5.308

48.229

256

4.436

57.710

256

4.837

52.925

256

5.378

47.601

256

4.617

55.447

128

5.998

21.340

128

6.159

20.783

64

6.499

9.848

## Choosing Network Protocol for Company's network:

As looking into the diagram, first I like chose wireless network and as we learnt from comparison I would like to use RC4 encryption method for wireless network diagram and discuss some key protocols used for encryption.

## 2.1 Wireless Access point (WAP):

Has this diagram shows it is wireless connection means it will use either WIFI connection or Bluetooth connection devices.

Considering this diagram the communication between manager laptop and wireless adaptor is done by wireless Access point and USB wireless adaptor is connecting other stations. Such as wireless Access point is connected with wired equivalent protocol. As I am using RC4 encryption algorithm for security protocols of 64 bit stream cipher.

## RC4:

This encryption algorithm is designed by Ron Rivest for RSA security. "It is variable key size stream with byte oriented operation". It also allows random permutation. I have used RC4 to have a secured communication via WEP (Wired Equivalent Protocol). The 64 bit RC4 key stream cipher is used in WEP, because of layer two security protocol. It can let network down

## 3.1 Description of Wired Equivalent Privacy:

The goal is to create private wired LAN and also Wireless LAN key that will used by WEP. The key is already shared and pre-established and the basic building blocks are encryption cyclic redundancy check (CRC) And RC4

The wired equivalent protocol can be supports up to four different base keys. This can be indentified as key 0 to 3. To develop the key we will need a selected base key of 24 bit Initialization vector (IV).

## Analysis of Network:

The company networks seem to be very sensitive because it has lot of department that are sharing valuable information and also sharing confidential data over a network. As I have seen there is a CNC programming workstation that need to be secure and encrypted. According to network diagram another important node is wireless access point and manager's laptop because manager has company valuable data and also some financial data that cannot be access by any unauthorized user so these terminals should be encrypted and secured.

## Wired network:

From the main daigram I would consider machine room swtich to tape backup unit and it is very sensitive are for data storage and server that must bhi encrypted and secured for the company. I suggest to use Kerberos Authentication versoin 5.

## 4.1 KERBEROS:

We will use Kerberos for authentication service that will make the use of trusted third party users to use the service by user authenticating for client server communication. We will be using Kerberos version 5 for web standards. That will provides centralized authentication system for server to client authentication

We had method of Kerberos version 4 of authentication by making changes in the methods now we using version 5.

## 4.2 Why KERBEROS:

Kerberos give us more security and it is strong enough that a potential opponent does not find any weak link.

Kerberos is more reliable than other web authentication service.