Securing Networks System Using Cryptographic Protocols Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

I have made a scheme to secure your company's (Uob Manufacturing Company) networks system using Cryptographic protocols. This system uses strong Cryptographic algorithms to encrypt data to travel save on a network. But you have to scarify 15-20% performance because of heavy encryption and decryption done by both end users. With such a minor performance penalty, your data will save. I will use The Ronald Rivest's algorithm. I think RC4 is the strongest algorithm. It is compatible to almost all hardware and software. However if you want to upgrade your hardware it also supports 64 bit processor. This report also includes the

Keywords:

Encryption algorithms, RC5, Uob Manufacturing Company, encryption protocol, RC2, RC4, RC5, DES, Triple DES,  TRIPLE_DES_3KEY, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

Introduction

In modern era where internet plays the main part also security comes first. Cryptography is the way or art of encryption and that is the main goal. The security in networks is very important as all valuable information travels on a network. Cryptography is used for small problem to convert into hard to understand and difficult to solve.

Cryptography allows protecting from theft or alteration, but it can also help us to do user authentication. (Kessler, 21 April 2011)

There are three main types of cryptographic schemes to full fill these goals: (Kessler, 21 April 2011)

Symmetric (secret key) cryptography

Asymmetric (public-key) cryptography

hash functions (Protocols)

Choosing Algorithms for Encryption:

Now a days every network related person concerning many algorithms for network security for data and valuable information. These algorithms are as follow:

DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, RC5, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

Not all algorithms are suitable for one situation. They are implementing with the level of complexity of the situation and level of how much security required. But there are some key points on based we can choose algorithm for encryption.

Performance: Sometimes strong encryptions slow down the CPU performance while weak encryption consumes fewer resources.

Key formation: Stronger the encryption is when longer the key has given.

Differences: Asymmetric encryptions are stronger then symmetric encryptions. As Asymmetric uses same key length but they affect the performance.

Password: Stronger the encryption is when longer the password has given.

The encryption of large data should use a symmetric key, and then its key should be encrypted by an asymmetric key. (Microsoft, 2000)

Comparison Encryption Algorithms:

Most of Algorithms are protecting valuable information. But each of these algorithms has different level of capabilities and complexities for security on a network like DES, tripleDES, AES, Blowfish, RC2, RC4 and Rijndael are most secure encryption algorithms in Cryptography.

For comparison on performance of these algorithms, I have concern the other resources. I have got some know source that have cryptography libraries in Crypto++. It is free and has all C++ class libraries. It includes all types of cryptography schemes coded and compile in MS Visual C++ .Net 2003. Table 1 shows the performance of the most commonly used algorithms.

Table 1 Comparison results using Crypto++

Algorithm

Megabytes(2^20 bytes) Processed

Time Taken

MB/Second

Blowfish

256

3.976

64.386

Rijndael (128-bit key)

256

4.196

61.010

Rijndael (192-bit key)

256

4.817

53.145

Rijndael (256-bit key)

256

5.308

48.229

Rijndael (128) CTR

256

4.436

57.710

Rijndael (128) OFB

256

4.837

52.925

Rijndael (128) CFB

256

5.378

47.601

Rijndael (128) CBC

256

4.617

55.447

DES

128

5.998

21.340

(3DES)DES-XEX3

128

6.159

20.783

(3DES)DES-EDE3

64

6.499

9.848

Choosing Network Protocol for Company's network:

As looking into the diagram, first I like chose wireless network and as we learnt from comparison I would like to use RC4 encryption method for wireless network diagram and discuss some key protocols used for encryption.

Wireless network

2.1 Wireless Access point (WAP):

Has this diagram shows it is wireless connection means it will use either WIFI connection or Bluetooth connection devices.

Considering this diagram the communication between manager laptop and wireless adaptor is done by wireless Access point and USB wireless adaptor is connecting other stations. Such as wireless Access point is connected with wired equivalent protocol. As I am using RC4 encryption algorithm for security protocols of 64 bit stream cipher.

RC4:

This encryption algorithm is designed by Ron Rivest for RSA security. "It is variable key size stream with byte oriented operation". It also allows random permutation. I have used RC4 to have a secured communication via WEP (Wired Equivalent Protocol). The 64 bit RC4 key stream cipher is used in WEP, because of layer two security protocol. It can let network down

3.1 Description of Wired Equivalent Privacy:

The goal is to create private wired LAN and also Wireless LAN key that will used by WEP. The key is already shared and pre-established and the basic building blocks are encryption cyclic redundancy check (CRC) And RC4

The wired equivalent protocol can be supports up to four different base keys. This can be indentified as key 0 to 3. To develop the key we will need a selected base key of 24 bit Initialization vector (IV).

3.2 Encryption details:

http://upload.wikimedia.org/wikipedia/commons/thumb/4/44/Wep-crypt-alt.svg/305px-Wep-crypt-alt.svg.png

Analysis of Network:

The company networks seem to be very sensitive because it has lot of department that are sharing valuable information and also sharing confidential data over a network. As I have seen there is a CNC programming workstation that need to be secure and encrypted. According to network diagram another important node is wireless access point and manager's laptop because manager has company valuable data and also some financial data that cannot be access by any unauthorized user so these terminals should be encrypted and secured.

Wired network:

From the main daigram I would consider machine room swtich to tape backup unit and it is very sensitive are for data storage and server that must bhi encrypted and secured for the company. I suggest to use Kerberos Authentication versoin 5.

4.1 KERBEROS:

We will use Kerberos for authentication service that will make the use of trusted third party users to use the service by user authenticating for client server communication. We will be using Kerberos version 5 for web standards. That will provides centralized authentication system for server to client authentication

We had method of Kerberos version 4 of authentication by making changes in the methods now we using version 5.

4.2 Why KERBEROS:

Kerberos give us more security and it is strong enough that a potential opponent does not find any weak link.

Kerberos is more reliable than other web authentication service.

It is password based system that everyone should not be get access to the server.

The service is scalable; it should be capable of providing large number of clients and services.

4.3 TECHNICAL SPECIFICATIONS:

We can use any encryption technics as cipher text is tagged with and encryption type identifer. Network Address are tagged with type and length allowing any networks to used so there is no need of internet protocol. For unambigious byte order the basic encoding role is provided by BES. ASN is used for all message structures. The ticket authentication is reused and allowing arbitary for life time. It also provide aupports for internal authentication.

Conclusion:

After deep investigation and comparison of algorithm we cannot use WEP which is already Cracked so that I suggest that we should apply AES/CCMP protocol for Wireless network that will provide a high security and encryption to the network for secure the information and data. For Wired Network I would suggest that they can go for my recommended solution that is Kerberos version 5 that as cover the drawbacks of version 4. That service will give high authentication security to client server and protect from attacker from outside of the company. These technologies I think best for this company.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.