This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
UoB Manufacture produces general engineering products with three major departments like management, finance and Technical. UoB manufacture communications between these departments are done by the IT network infrastructure, which has the old and traditional communication with low level security. Concern about the security, IT services department put forwarded a proposal to make network infrastructure more security using encryption protocols. This course work gives a details information about the proposed encryption protocols and also provides key features of the encryption protocols
This course work provides a report on increasing of security level within network infrastructure in UoB Manufacturing. UoB Manufacturing has different department, that holds and transferring sensitive and confidential data across the network. UoB manufacturing has weak security standards, where hacker and intruders can easily enter in the network and can to cause serious issues to the company. This course work provides an overview of the threats that can be used to attack the present network infrastructure by hackers or intruders, how to make secure network infrastructure using encryption protocols and key factor of encryption protocols. In this course work, two different departments and its two different ways of communication will be analysed, and also discuss about the key features of encryption protocols used in the department.
MD5 algorithm is Encryption algorithm that to be used in network infrastructure. This course work provides an overview about the MD5 algorithm and its features and protocols that support MD5 algorithm. UoB manufacture has three main departments that handle the whole company through network communication; the two different way of communication that to be analysis are wireless communication in the quality management in first floor and server communication in the ground floor. The below course work will discuss the algorithm and two network segment.
Encryption Algorithm is a process of converting a plain text into cipher text with mathematical techniques, which can be convert again plain text by reversing the process. There are two type of encryption they are symmetric and asymmetric encryption algorithm. Symmetric encryption use single key for both encryption and decryption and asymmetric key use one key for encryption and another key for decryption. There are some key factors to choose an encryption protocols like confidence and compatibility
Confident: is to know that how data has been encrypted and in the right way
Compatibility: is to know that how data can encrypt and decrypt across the network.
The proposed MD5 encryption algorithm for Network infrastructure will satisfied the key criteria for encryption protocols. The following course work will discuss the features of MD5 algorithm
MD5 Algorithm was developed by Professor Ron Rivest, one of the founders and developer of RSA security (Bruce Byfield, 2001). MD5 algorithm is an updated version of MD4 algorithm, where MD5 algorithm takes any length of input and generates 128 bit length of output which is called as a finger-print or message digest. The features of MD5 algorithm is run faster in 32 bit computer and does not need a wide table for encryption algorithm. MD5 provides a high security than the MD4 algorithm. MD5 algorithm is mainly designed for network standard message authentication.
MD5 ENCRYPTION PROTOCOLS
There are protocols using MD5 algorithm for encrypting the data while transferring from one node to another. The protocols like EAP Extensible Authentication Protocol use MD5 algorithm for encryption of data. EAP is one of the framework protocols for authentication where it is used in authentication in dial-up, VPN and LAN Local Area Network (LAN). There are there authentication methods used in the EAP protocols they are MD5-Challenge, OTP and GTC. MD5-CHAP (Challenge Handshake Authentication Protocol) is another protocol which use MD5 algorithm for value calculation for both device in the authentication process.
MD5 PROTOCOL AUTHENTICATION
Clients get successful connection to the server after authentication of all three methods in EAP protocols. First client send identity to server, server reply with challenge like OTP then client reply with Nak respond finally MD5 challenge request will be send by the server to solve a cipher text with its client key. If the text get encrypted then client get successful connection from the server if not the request will be rejected by the server. Below diagram show the authentication method of a server and client.
Figure 1.0 Authentication
In CHEP protocols MD5 algorithm checks the response send by the client with its own calculation. The connection will be established between client and server when successful calculation checks.
In this course work, two network areas have been taken for discuss after implement of MD5 algorithm. These two networks have two different communication techniques wired and wireless. The first network site situated in first floor, it has wireless network as a medium of communication. Wireless communication medium is one of the fine sources for hacking methods unless it has high secured protocols. There are lot of protocols available for wireless communication which has different way of authentication methods and encryption standards. Attack like packet sniffer, man in the middle, war driving and other can be perform with week wireless setting. There are week authentication protocols like WEP, WAP and WEP-PSK uses a simple encryption standard, where it can be cracked by simple software like Aircrack, Brute force attack tool and other (Jon Erikson, 2003). The encryption protocols discussed above like EAP and CHEP protocols are using different type of authentication methods with high standards of MD5 encryption algorithm. MD5 algorithm uses 128 bit length of key for encryption of packet that is transferring from server to the client. This kind of encryption protocols can prevent the network from the hackers and intruders.
Figure 2.0 Wireless Communications in First Floor
The second network segment in the UoB manufacture is wired server communication. There are two servers that are attached to the CNC Machinery, where the designs are transfer from the server to the Machinery.
Figure 3.0 Wired Communications from the Server
These two server are transferring sensitive data to the machinery, there are possibility of attacks like DNS Mapping, MAC Address Mapping and Attack against TCP/IP( Qijun Gu). There are protocols like AAA (Authentication, Authorization and Accounting) that can be used for secure authentication and authorization. AAA protocols only allow authorized user to access the server, the role of MD5 algorithm techniques allow the user to access only when the value provided by the user matches with the server MD5 algorithm. After successful connection between the user and the server the packet are encrypted by the MD5 encryption algorithm. There are many authentication protocols that can allow the unauthorised user to access the server with week authentication and authorization methods.
This type of vulnerable authentication can be replaced with the strong authentication methods with strong encryption algorithm like MD5.
Vulnerability in the network will bring serious causes to the whole network infrastructure in a company; it can be stopped by the updating security techniques. Encryption Algorithm like MD5 and the protocols used for secure authentication and authorization can stop the unauthorised user access and transferring of confidential data across network. In conclusion with the report, the network supervisor has given the best security option that provides high standard of encryption with MD5 algorithm.