This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
I have made a scheme to secure your company's (Uob Manufacturing Company) networks system using Cryptographic protocols. This system uses strong Cryptographic algorithms to encrypt data to travel save on a network. But you have to scarify 15-20% performance because of heavy encryption and decryption done by both end users. With such a minor performance penalty, your data will save. I will use The Ronald Rivest's algorithm. I think RC4 is the strongest algorithm. It is compatible to almost all hardware and software. However if you want to upgrade your hardware it also supports 64 bit processor. This report also includes the
Encryption algorithms, RC5, Uob Manufacturing Company, encryption protocol, RC2, RC4, RC5, DES, Triple DES, Â TRIPLE_DES_3KEY, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.
In modern era where internet plays the main part also security comes first. Cryptography is the way or art of encryption and that is the main goal. The security in networks is very important as all valuable information travels on a network. Cryptography is used for small problem to convert into hard to understand and difficult to solve.
Cryptography allows protecting from theft or alteration, but it can also help us to do user authentication. (Kessler, 21 April 2011)
There are three main types of cryptographic schemes to full fill these goals: (Kessler, 21 April 2011)
Symmetric (secret key) cryptography
Asymmetric (public-key) cryptography
hash functions (Protocols)
Choosing Algorithms for Encryption:
Now a days every network related person concerning many algorithms for network security for data and valuable information. These algorithms are as follow:
DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, RC5, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.
Not all algorithms are suitable for one situation. They are implementing with the level of complexity of the situation and level of how much security required. But there are some key points on based we can choose algorithm for encryption.
Performance: Sometimes strong encryptions slow down the CPU performance while weak encryption consumes fewer resources.
Key formation: Stronger the encryption is when longer the key has given.
Differences: Asymmetric encryptions are stronger then symmetric encryptions. As Asymmetric uses same key length but they affect the performance.
Password: Stronger the encryption is when longer the password has given.
The encryption of large data should use a symmetric key, and then its key should be encrypted by an asymmetric key. (Microsoft, 2000)
Comparison Encryption Algorithms:
Most of Algorithms are protecting valuable information. But each of these algorithms has different level of capabilities and complexities for security on a network like DES, tripleDES, AES, Blowfish, RC2, RC4 and Rijndael are most secure encryption algorithms in Cryptography.
For comparison on performance of these algorithms, I have concern the other resources. I have got some know source that have cryptography libraries in Crypto++. It is free and has all C++ class libraries. It includes all types of cryptography schemes coded and compile in MS Visual C++ .Net 2003. Table 1 shows the performance of the most commonly used algorithms.
Table 1 Comparison results using Crypto++
Megabytes(2^20 bytes) Processed
Rijndael (128-bit key)
Rijndael (192-bit key)
Rijndael (256-bit key)
Rijndael (128) CTR
Rijndael (128) OFB
Rijndael (128) CFB
Rijndael (128) CBC
Choosing Network Protocol for Company's network:
As looking into the diagram, first I like chose wireless network and as we learnt from comparison I would like to use RC4 encryption method for wireless network diagram and discuss some key protocols used for encryption.
2.1 Wireless Access point (WAP):
Has this diagram shows it is wireless connection means it will use either WIFI connection or Bluetooth connection devices.
Considering this diagram the communication between manager laptop and wireless adaptor is done by wireless Access point and USB wireless adaptor is connecting other stations. Such as wireless Access point is connected with wired equivalent protocol. As I am using RC4 encryption algorithm for security protocols of 64 bit stream cipher.
This encryption algorithm is designed by Ron Rivest for RSA security. "It is variable key size stream with byte oriented operation". It also allows random permutation. I have used RC4 to have a secured communication via WEP (Wired Equivalent Protocol). The 64 bit RC4 key stream cipher is used in WEP, because of layer two security protocol. It can let network down
3.1 Description of Wired Equivalent Privacy:
The goal is to create private wired LAN and also Wireless LAN key that will used by WEP. The key is already shared and pre-established and the basic building blocks are encryption cyclic redundancy check (CRC) And RC4
The wired equivalent protocol can be supports up to four different base keys. This can be indentified as key 0 to 3. To develop the key we will need a selected base key of 24 bit Initialization vector (IV).
3.2 Encryption details:
Analysis of Network:
The company networks seem to be very sensitive because it has lot of department that are sharing valuable information and also sharing confidential data over a network. As I have seen there is a CNC programming workstation that need to be secure and encrypted. According to network diagram another important node is wireless access point and manager's laptop because manager has company valuable data and also some financial data that cannot be access by any unauthorized user so these terminals should be encrypted and secured.
From the main daigram I would consider machine room swtich to tape backup unit and it is very sensitive are for data storage and server that must bhi encrypted and secured for the company. I suggest to use Kerberos Authentication versoin 5.
We will use Kerberos for authentication service that will make the use of trusted third party users to use the service by user authenticating for client server communication. We will be using Kerberos version 5 for web standards. That will provides centralized authentication system for server to client authentication
We had method of Kerberos version 4 of authentication by making changes in the methods now we using version 5.
4.2 Why KERBEROS:
Kerberos give us more security and it is strong enough that a potential opponent does not find any weak link.
Kerberos is more reliable than other web authentication service.
It is password based system that everyone should not be get access to the server.
The service is scalable; it should be capable of providing large number of clients and services.
4.3 TECHNICAL SPECIFICATIONS:
We can use any encryption technics as cipher text is tagged with and encryption type identifer. Network Address are tagged with type and length allowing any networks to used so there is no need of internet protocol. For unambigious byte order the basic encoding role is provided by BES. ASN is used for all message structures. The ticket authentication is reused and allowing arbitary for life time. It also provide aupports for internal authentication.
After deep investigation and comparison of algorithm we cannot use WEP which is already Cracked so that I suggest that we should apply AES/CCMP protocol for Wireless network that will provide a high security and encryption to the network for secure the information and data. For Wired Network I would suggest that they can go for my recommended solution that is Kerberos version 5 that as cover the drawbacks of version 4. That service will give high authentication security to client server and protect from attacker from outside of the company. These technologies I think best for this company.