Free Essay

Wifi Encryption

In:

Submitted By cwtalbott
Words 1929
Pages 8
Term Paper
Christopher Talbott
American Public University System

Wireless Networks and their Security Risks
This purpose of this paper is to discuss the current state of Wireless networks. Their different security features and known issues with wireless technology. As well as how business implement Wireless networks, the different hacking methods used against Wireless networks and its future technological uses.
There are many different wireless standards ranging from 802.11b to the new 802.11ac standard. Many manufactures exist with their own unique features for both home and business use. Each Wireless network standard was set forth an agreed upon by the IEEE or Institute of Electrical and Electronics Engineers. “IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE's highly cited publications, conferences, technology standards, and professional and educational activities, ("About IEEE," 2014)”.
The IEEE sets forth the standards for each 802.11 standard, starting with 802.11b, which is a “Wireless radio-frequency local area network. 802.11b, adopted Sept. 1999, operates at 11 Mbps in 2.4GHz band. By end of 2000, IEEE to approve backward-compatible 22 Mbps version of 802.11b HR, to be dubbed 802.11b HRb, (Palenchar, J. (2000)”. 802.11b was the first widely adopted Wireless network for home use. Routers and wireless cards using the 802.11b standard allowed for the home networks to become a reality.
The next standard was 802.11g, according to Zyren, “IEEE 802.11g draft standard extends data rates for 2.4-GHz wireless-LAN (WLAN) systems to 54 Mbits/second and provides backward compatibility with existing 802.llb (Wi-Fi) equipment, Zyren, J. (2002)”. Meaning that 802.11b wireless PC cards were compatible with 802.11g routers. So if a user upgraded to router to the new standard their old wireless PC card would still work. But in order to utilize the faster speed of 802.11g a new wireless PC card had to be purchased as well. This backwards compatible allowed for easier transition to the newer standard. The trend of backwards compatibility would continue through future iterations of 802.11 as well.
802.11g was followed by 802.11n, “802.11n connections support maximum theoretical network bandwidth up to 300 Mbps depending primarily on the number of wireless radios incorporated into devices, (Mitchell, 2014)”. This standard was also to first to utilize MIMO, Multiple in Multiple Out antennas. Meaning that multiple radio signals can be received and transmitted at the same time. Unlike previous editions where only two antennas were used, one for receiving and one for transmitting. With MIMO 802.11n is capable of faster connections speeds up to 300 Mbps. Also like its predecessor 802.11g, 802.11n is backwards compatible with 802.11b and 802.11g.
The most recent standard is 802.11ac, according to CISCO, “first-wave 802.11ac products built around 80 MHz and delivering up to 433 Mbps (low end), 867 Mbps (mid-tier), or 1300 Mbps (high end) at the physical layer. Second-wave products may promise still more channel bonding and spatial streams, with plausible product configurations operating at up to 3.47 Gbps, ("802.11ac: The fifth," 2014)”. Same as before this new standard is backwards compatible with previous standards. But with any new standard new hardware is needed to achieve the maximum speed of 802.11ac.
Each of the above 802.11 standards has various security features it uses to help protect the Wireless network. The first of these is WEP, Wired Equivalent Privacy which used RC4 encryption to secure 802.11b Wireless networks. In a paper published in 2001 by Scott Fluhrer, Itsik Mantin, and Adi Shamir, called Weaknesses in the Key Scheduling Algorithm of RC4. They described how intercepting packets can lead to discovery of the security key and ultimately allow a hacker to gain access to a WEP encrypted network with relative ease. Programs are available now that can perform this action in under a minute, some of which will be discussed later in this paper.
Wi-Fi Protected Access or WPA was the successor to WEP and was more secure. “Like WEP, WPA uses RC4 encryption for its keys, but unlike WEP, WPA modifies the original key for greater security and supports an optional authentication server, ("Wi-fi protected access," 2005)”. WPA was more secure then WEP, but it was not a complete solution. WPA2 as then implemented using AES encryption and until recently was not hackable. To quote O’Donnell, “To be clear, hackers have managed to crack WPA2-PSK (Pre Shared Key), which is primarily used by most home and small business users. WPA2-Enterprise, used in the corporate world, has a much more complicated setup involving the use of a RADIUS authentication server and is still a safe bet for wireless protection, (O'Donnell, 2014)”.
To counteract these issues the following security features are recommended and most are standard features on newer wireless routers. The first is selecting a complicated and long PSK (Pre Shared Key). Having a key that has multiple upper and lower case letters as well as numbers can make it more difficult to crack. An example would be H1mYN@M3!T0M which is hi my name is tom. By using a complicated PSK you make your Wireless network harder to crack. A second option is change your routers default SSID (Service Set Identifier). Lists of default SSID’s can be found online just by doing a simple google search. Changing an SSID from its default can also help protect your Wireless network.
Third would be to hide your SSID, most wireless routers have an option to turn off broadcasting of the SSID. Doing so disables the ability of your Wireless network from being seen by a device. But by also doing this you will have to manually type in the SSID into any device that wishes to be added to the Wireless network, instead of just scanning for the name and selecting it. The finally and forth security option is called MAC address reservation. By creating a list of all devices currently connected to the wireless router, you can implement a MAC address filter. Meaning that only the devices which are stored in the MAC address filter can access the wireless router, all others will be denied. One issue with doing this, is that when adding a new device to the wireless router, say a new cell phone or tablet, you will have to disable the filter in order to add the new device. Once done the filter would have to be enabled again. Implementing the above security features can greatly increase the security of your Wireless network and make it less likely of a target to hackers.
There are many tools on the Internet which can be used to hack Wireless networks, the two most common are Linux based operation systems called BackTrack Linux and KaliLinux, which is the successor to BackTrack Linux. “BackTrack Linux (http://www.backtrack-linux.org/) is a custom distribution designed for security testing for all skill levels from novice to expert. It is the largest collection of wireless hacking, server exploiting, web application assessing, social-engineering tools available in a single Linux distribution, (Hess, 2014)”. BackTrack has many programs built into it that can be used for Wireless network hacking, one of them is a program called Aircrack. Aircrack is a terminal program that can be used to capture and analyze Wireless network traffic in order to obtain a WEP security key.
KaliLinux is the predecessor to BackTrack and is more user friendly. Unlike BackTrack which required the user to know terminal commands to run the programs, KaliLinux is almost entirely GUI based making it much easier to use and configure. According to Averley, “The new Kali Linux incorporates more than 300 penetration testing and security auditing programs with a Linux operating system, delivering an all-in-one solution that enables IT administrators and security professionals to test the effectiveness of risk mitigation strategies, (Averley, 2013)”. Both of these operating systems are free since they are Linux distributions, meaning anyone can download them. This also means there are very easily accessible, but they do have a strict learning curve. Both of these operating systems are designed for penetration testing and not for hacking your neighbors Wireless network, do so may violate local and federal laws.
Considering all of this there is still plenty of room for advancement in Wireless networks, whether it be in the realm of enhanced security or faster connection speeds. Wireless networks are the future of connectivity and they can only get better. One company that seeks to change Wireless networks is Artemis with their pCell wireless technology. According to Anthony, “…early demonstrations of the technology are to be believed, pCell appears to completely dismantle the idea of a “wireless spectrum crunch,” allowing each mobile device to receive full wireless bandwidth from congested base stations, potentially increasing our total wireless bandwidth by 1,000x, (Anthony, 2014)”. The concept of pCell is giving each wireless device a dedicated cellular frequency that is maintained and controlled by what is called a DIDO (Distributed-Input-Distributed-Output) server. “DIDO, in theory, gives every wireless user in a given area full access to the available spectrum, rather than having to share it, (Anthony, 2014)”. If this technology proves to work then the future of Wireless networks is looking very exciting.
In conclusion Wireless networks come in various different standards with multiple security options and flaws. Though these flaws can be mitigated by implementing the proper security measures, nothing will ever be 100% secure. With operating systems such as BackTrack Linux and KaliLinux free and readily available there will always be someone trying to improperly access your Wireless network. In the end due to the public’s increasing demand for be connected everywhere and all the time, Wireless networks are the growing standard and will only get faster and more secure as we head into the future.

References
About IEEE. (2014). Retrieved from http://www.ieee.org/about/index.html

Palenchar, J. (2000). IEEE 802.11b HR, 802.11b HRb, 802.11a. TWICE, 15(17), 20-22. Retrieved from http://search.proquest.com/docview/232272524?accountid=8289

Zyren, J. (2002). 802.11g spec: Covering the basics. Electronic Engineering Times, (1204), 61-61,68+. Retrieved from http://search.proquest.com/docview/208083508?accountid=8289

Mitchell, B. (2014). 802.11n. Retrieved from http://compnetworking.about.com/od/wireless80211/g/bldef_80211n.htm

802.11ac: The fifth generation of wi-fi technical white paper. (2014). Retrieved from http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-3600-series
Wi-fi protected access (wpa), wpa2 and 802.11i. (2005, Oct 24). Retrieved from http://www.quepublishing.com/articles/article.aspx?p=421706

O'Donnell, A. (2014). Think your wpa2-encrypted wireless network is secure? think again.. Retrieved from http://netsecurity.about.com/od/secureyourwifinetwork/a/WPA2-Crack.htm

Hess, K. (2014). Backtrack linux: The ultimate hacker's arsenal. Retrieved from http://www.admin-magazine.com/Articles/BackTrack-Linux-The-Ultimate-Hacker-s-

Averley, P. (2013, March 13). Rapid7 introduces official metasploit support for new kali linux free security auditing toolkit. Retrieved from http://www.lexisnexis.com.ezproxy2.apus.edu/hottopics/lnacademic/?verb=sr&csi=162367&sr=HLEAD%28Rapid7%20Introduces%20Official%20Metasploit%20Support%20for%20New%20Kali%20Linux%20Free%20Security%20Auditing%20Toolkit%20Rapid7%20Introduces%20Official%20Metasploit%20Support%20for%20New%20Kali%20Linux%20Free%20Security%20Auditing%20Toolkit%20Closer%20Integration%20with%20the%20Enterprise-Ready%20Evolution%20of%20BackTrack%29%20and%20date%20is%202013

Similar Documents

Free Essay

Baterias

...Todos sabemos que el calor altera las propiedades de los elementos y expande los materiales, también sabemos que el frio contrae los elementos, es decir tanto cargar y descargar la pila va alterando su composición física entonces al poner frio y contraer los elementos de alguna forma vuelve casi a la normalidad, si a esto sumamos que el frio produce hidrogeno, las pilas de litio se recuperan milagrosamente.  Hecho esto la bateria recuperara Gran Parte de su Capacidad. Si no sabéis si os merece la pena hacerlo aqui traigo resultados: < < < RESULTADOS > > >  » ANTES (DURACIÓN: 4 - 6 Horas): * WiFi: ON * BlueTooth: OFF * GPS: OFF * Sincronización Automática: OFF * Pantalla: Brillo 25% * Aplicaciones Abiertas: OperaMobile, Tuenti, Twitter, Whatsapp, Viber, ADW Launcher » DESPUÉS (DURACIÓN: 20 Horas) * WiFi: ON * BlueTooth: On * GPS: ON * Sincronizacion Automatica: ON * Pantalla: Bloqueada * Aplicaciones Abiertas: Tuenti, Twitter, Whatsapp, Viber, ADW Launcher, Marca.com * MÚSICA: Volumen Medio La duración de la batería puede variar en...

Words: 337 - Pages: 2

Free Essay

Instrucciones Gigaset Hd600T

...Índice Por su seguridad Instrucciones de seguridad 2 2 El Gigaset HD600 T ¿Qué es TDT? Gigaset HD600 T Funciones del mando a distancia Funciones del panel frontal Conexiones del panel trasero Funciones del panel lateral 4 4 4 6 9 9 10 Instalación del Gigaset HD600 T Preparar la instalación Seleccionar la antena Conectar dispositivos Diagrama de conexiones 11 11 11 12 13 Interfaz del menú Instalación por primera vez Menú de Configuración Menú DTV Menú AV IN (entrada de audio y vídeo) Menú Sincronizador de grabación Menú de navegación Menú copia de archivos Radio por Internet Menú IMS Actualización del firmware Guía electrónica de programación (EPG) de InOut TV 16 16 17 26 28 28 31 38 40 41 41 42 Anexo Especificaciones Preguntas más frecuentes Permiso Derechos de autor y marcas comerciales Garantía Declaración GPL Servicio Técnico (Servicio de Atención al Cliente) Certificado de garantía Condiciones generales de uso del servicio InOut TV 44 44 45 47 48 48 48 49 49 50 Glosario 51 1 Para su seguridad Lea detenidamente las instrucciones de seguridad antes de poner en marcha la unidad. Tenga en cuenta que algunas funciones descritas en estas instrucciones de uso no están disponibles en todas las versiones de software. Instrucciones de seguridad Instrucciones generales de seguridad Tenga a mano estas instrucciones de funcionamiento y entregue la unidad a otras personas solamente con las instrucciones y los accesorios suministrados...

Words: 13390 - Pages: 54

Free Essay

Encryption and Its Uses in Communication

...Encryption is a very important aspect of our daily lives. Everywhere we go and everything we do now involves some sort of encryption technology. From turning on our cars to using a card access to gain entry to our workplace, encryption is there. More specifically, encryption in communication is a vital component to everyday life. Without encryption, our lives would be much different and unsecure. According to Oded Goldreich (2004), There are 2 main types of encryption: One is called Symmetric-key and the other is public-key encryption (pp 375-376). The Symmetric-key algorithm uses the same cipher for both encryption and decryption. Conversely, the public-key algorithm requires 2 separate keys. One of these keys encrypts the text or message and the other decrypts it. A big drawback to using the Symmetric-key system is that both parties must possess the single, shared key (Mullen & Mummert, 2007). The public-key system kept both parties having separate keys that neither even knew about, but could still decipher the message. Encryption is defined as the activity of converting data or information into code. There are a lot of different ways that we use encryption. Cell phones, web browsers, wireless access, and computer passwords are all different types of communication encryption. Encryption is definitely not a new technology. It has been used by militaries and governments to communicate secretly for years. Cell phones are a prime example of the encryption we use today. In fact...

Words: 1437 - Pages: 6

Free Essay

Unit 10

...1. Traditional encryption methods use the single key. Modern encryption methods use public key and private key. The public key is used to encrypt and a private key is used to decrypt. The only people who can open the file are the owner, user with the private key, and recovery agent. Once you go to the file right click then click the properties button. Once you click the properties button click the advanced button then select encrypt contents to secure data. Once you have done this the file name should turn a different color. * Public key- is used to encrypt * Private key- is used to decrypt 2. Windows firewall can block ports and IP addresses. You can access this information through the control panel, system tray, windows firewall utility, or my network places * Firewall- is a security device in the computer where you can change settings like outside networks using your modem to get internet and to prevent someone from hacking in your computer to see your information. * Where to configure settings for the firewall- control panel, system tray, or network places. 3. When two wireless devices communicate directly with each-other they use the Ad Hoc mode. Most wireless networks use what’s called wireless access point (WAP). The WAP creates a hot spot so other wireless devices can connect to it unless the firewall is setup so other devices can’t connect to it. The service set identifier (SSID) it sets broadcast presence to any wireless devices that might...

Words: 410 - Pages: 2

Free Essay

Encryption

...ALGORITHMS OF ENCRYPTION This method will used two different type faces slightly differing in weight (boldness). it will broke up the ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character). A=***** G=**BB* M=*BB** S=B**B* Y=BB*** B=****B H=**BBB N=*BB*B T=B**BB Z=BB**B C=***B* I=*B*** O=*BBB* U=B*B** D=***BB J=*B**B P=*BBBB V=B*B*B E=**B** K=*B*B* Q=B**** W=B*BB* F=**B*B L=*B*BB R=B***B X=B*BBB For example, our some secret message as above : To be or not to be that is the question. Whether ‘tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message. M E E T M E B E tobeo rnott obeth atist heque stion Wheth ertis H I N D T H E G noble rinth emind tosuf ferth eslin gsand arrow Y M A F T E R S sofou trage ousfo rtune ortot akear msaga insta C H O ...

Words: 274 - Pages: 2

Free Essay

Computer Security

...Assignment 1 Solution 1. Compare and contrast symmetric encryption with public-key encryption, including the strengths and weaknesses of each. Solution Scalability: with public-key encryption, multiple users can send encrypted messages to Alice using her public key and these messages can be decrypted only by Alice; thus, a linear number of publicprivate key pairs need to be established, distributed and protected to allow pairwise confidential communication between any two users; instead, symmetric encryption requires a quadratic number of secret keys. Efficiency: existing symmetric encryption methods are much faster and use much shorter keys than existing public-key encryption methods. Usability: symmetric-key encryption is easier to understand by a non-expert than public-key encryption. 2. Give an example of the false sense of security that can come from using the “security by obscurity" approach. Solution There are many examples. One possibility would be to use a weak encryption algorithm, like the Caesar cipher and try to keep secret the type of algorithm that you are using, in addition to keeping the key secret. The problem with this approach is that if someone guesses you are using such an algorithm or is able to reverse engineering your software, then they will discover your algorithm. From there it is a simple matter to break your weak encryption scheme. 3. Benny is a thief who tried to break into an Automated Teller Machine (ATM) using a screwdriver, but was only...

Words: 578 - Pages: 3

Premium Essay

Computer Science

...ICT-457 Network Security Sum-2013 HW-9 1. Provide the name of a link to 2 publicly available encryption software tools. http://export.stanford.edu/encrypt_ear.html https://www.cryptanium.com/?gclid=CLbz5Z7KlbgCFcU5QgodrC0APg 2. Explain the difference between symmetric and asymmetric key cryptography. Provide an example where each is used. Pg. 282/283. Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers. Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers. Symmetric key cryptography cannot secure correspondence until after the two parties exchange keys. Asymmetric key cryptography uses a cipher with two separate keys. One is for encryption and one for decryption. Correspondents do not first have to exchange secret information to communicate securely. With asymmetric key cryptography, an opponent can intercept everything and still not be able to decipher the message. 3. Explain why having an entity’s public key alone does not allow someone to decrypt a message. Pg. 288. Because it is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 4. Does a hash function ensure integrity or privacy? Explain your answer. Pg.309/310. Hash functions help to detect forgeries. They compute a checksum of a message and then combine it with a cryptographic function so that the result...

Words: 363 - Pages: 2

Premium Essay

Security on the Internet

...attacking. Designing a system that is capable of resisting attack from within, is still growing and evolving at a fast pace, is probably impossible. Changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes. The challenges for the security industry are growing. With the electronic commerce spreading over the Internet, there are issues such as nonrepudiation to be solved. Financial institutions will have both technical concerns, such as the security of a credit card number or banking information, and legal concerns for holding individuals responsible for their actions such as their purchases or sales over the Internet. Issuance and management of encryption keys for millions of users will pose a new type of challenge. While some technologies have been developed, only an industry-wide effort and cooperation can minimize risks and ensure privacy for users, data confidentiality for the financial institutions, and nonrepudiation for electronic commerce. With the continuing growth in linking individuals and businesses...

Words: 2435 - Pages: 10

Free Essay

Security Systems Project 1

...worthless. * LAN Domain – consists of all machines connected to your network in a local setting. * Unauthorized access to the LAN commonly comes from unlocked wiring closets and data-centers. Simply keep these items under lock and key and well organized and at least the hard lines are secure. * LAN-to-WAN Domain – where the IT infrastructure links to a wide area network and the Internet. * If local users download unknown file type attachments from unknown sources, then you should apply file transfer monitoring, scanning, and alarming for unknown file types from unknown sources. * WAN Domain- connects remote locations to your domain. * If you are vulnerable to eavesdropping, use encryption and VPN tunnels for end to end secure IP communications. Also, follow your data classification standards and guidelines. * Remote Access Domain- connects remote users to your domain. * To stop brute-force and user ID and password attacks you must establish a strong password policy. Passwords should be changed every 30 to 60 days and must be at least eight characters long. * System/Application Domain- holds all the mission-critical systems, applications and data. * I f your private data is compromised separate private data elements...

Words: 299 - Pages: 2

Free Essay

Backup Criteria

...got lost or hacked. The way we have decided to backup our system is as soon as a customer uploads their information to make a purchase, it is immediately transferred into the system as a temporary file, at the end of each work day, we have all the temporary files transferred to our Cloud. The Cloud infrastructure allows for our company to securely share our files amongst one another, with also insuring that our information remains just that, ours. To guarantee that our Cloud isn’t hacked or if the server goes down or fails, our information isn’t lost, we have set the system to run with a Cloud Encryption Key rotation. We are using a split key encryption, meaning that I am the only one that has access to the key. No one including the government has access to this key. Be that as it may, security is always the number one priority for data so every month I change my encryption key to ensure that further security is in place. After one calendar month of information is gathered, we save all the data and transfer it using a hard disk. This hard disk is then taken by me once a month to a safety deposit box I have setup at a bank to store all the information securely. So once the information is in the Cloud, if the server fails for some reason, we will not lose...

Words: 675 - Pages: 3

Free Essay

Week 6 Conference

...What is asymmetric encryption and why do we need it? Asymmetric encryption is also known as public key encryption where there are two keys, a public key and a private key (Ezeobika, 2010). One key is used to encrypt and the other to decrypt (Hitachi ID Systems, Inc., 2013). Asymmetric encryption allows users to send secret messages by encrypting with the public key that belongs to the recipient (Hitachi ID Systems, Inc., 2013). Only the recipient will be able to decrypt the message because only that person will have access to the required key (Hitachi ID Systems, Inc., 2013). A somewhat similar way to view this is the locking and unlocking of a safety deposit box at the bank. The bank has the “public” key that is used as one of the necessary keys to open and close the box. In this situation “public” refers to the same key used for other safety deposit boxes within the bank. While the renter has the private key that is also necessary to open and close the box. Asymmetric encryption is useful because it allows for digital signatures which allow the person who is receiving a message to verify that a message is truly from a particular sender and to detect if the message has been altered (Ezeobika, 2010). Lastly, asymmetric encryption allows for accountability because once a message has been digitally signed the sender cannot deny having sent it (Ezeobika, 2010). Agrawal, M., & Mishra, P. (2012, May). A comparitive survey on symmetric key encryption techniques. International...

Words: 399 - Pages: 2

Free Essay

Computer Security

...Provide answers to the following exercises from the Goodrich and Tamassia textbook. 1) Question C-1.3 (p. 48) Suppose an Internet service provider (ISP) has a voice over IP (VOIP) telephone system that is manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VOIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this. 2) Question C-1.12 (p. 50) Barrack often sends funny jokes to Hillary. He does not care about confidentiality of these messages but wants to get credit for the jokes and prevent Bill from claiming authorship of or modifying them. How can this be achieved using public key cryptography? 3) Question C-1.15 (p. 51) Describe a method that allows a client to authenticate multiple times to a server with the following requirements. a. The client and server use constant space for authentication. b. Everytime the client authenticates to the server, a different random value for authentication is used (for example, if you have an n different random value, this means that sharing a key initially and using it for every round of authentication is not a valid solution. Can you find any vulnerability for this protocol? 4) Question C-2.2 (p.107) For safety reasons, external locked doors on commercial buildings have mechanism for people on the inside to escape without using a key or combination. One common mechanism uses an infrared...

Words: 762 - Pages: 4

Free Essay

Securing a Network

...audit the firewall to make sure everything works properly. Once everything is checked on and I have finished making sure it is running smooth I will have an ongoing maintenance. This ongoing maintenance will detect anything suspicious and any intrusions. A method of encrypting alphabetic: P mxlfop sy lbffdtgkee pexugbpipc. Using Vigenere Cipher I was able to come up with this Cipher. I used http://rumkin.com/tools/cipher/vigenere-autokey.php# an online cipher to help with this Cipher, using the alphabet key A and the passphrase Patsy. I believe this a very secure cipher due to the fact that there can be up to 26 different cipher alphabets. When securing the network that I have chosen I need an antivirus application, firewall, and encryption. The Antivirus is used, just as the name insists, to detect virus before they enter your computer. There can be many threats to a WAN network, just as any other network. Businesses should take all the necessary precautions to make sure that their network is secure and protected. Physical forms of a WAN can include authentication on servers,...

Words: 1001 - Pages: 5

Premium Essay

History of Cryptography

...OF CRYPTOGRAPHY Contents 1. Introduction 2. Classical Encryptions (Ancient Times) 3. Classical Encryptions (Middle Ages) The Cipher of Mary Queen of Scots Vigenère Ciphers Uesugi Cipher 3 4 6 6 6 7 4. Modern Ciphers: Ciphers during World War I and the Emergence of Encryption Machines German Communication Cables Disconnected by the United Kingdom Zimmermann Telegram ADFGVX Cipher The Birth of Enigma 8 8 8 8 9 5. Modern Ciphers: Encryptions in the Computer and Internet Era DES Cipher Public-Key Cryptosystem RSA Cipher Decrypting the DES Cipher Responsive Action of Cipher Enhancements for SSL 10 10 10 11 12 12 6. The Future of Encryption 7. Conclusion: Enhancing the Effectiveness of Encryptions used for SSL References 13 14 14 2 © 2013 Thawte, Inc. All rights reserved. Thawte, the thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affi liates in the United States and in foreign countries. All other trademarks are property of their respective owners. 1. Introduction E ncryption and related technologies are widely and frequently used as a means of ensuring that information is secure, and their importance has been growing with the increasingly widespread utilization of the Internet. The use of encryption can be traced to as far back as about 3000 B.C., during the Babylonian Era. Encryption technologies evolved as they were used in military and political...

Words: 6411 - Pages: 26

Free Essay

Symmetric Key Encryption

...Symmetric key encryption is also known as shared-key, single-key, secret-key, and private-key or one-key encryption. In this type of message encryption, both sender and receiver share the same key which is used to both encrypt and decrypt messages. Sender and receiver only have to specify the shared key in the beginning and then they can begin to encrypt and decrypt messages between them using that key. Examples include AES (Advanced Encryption Standard) and TripleDES (Data Encryption Standard). Advantages - Simple: This type of encryption is easy to carry out. All users have to do is specify and share the secret key and then begin to encrypt and decrypt messages. - Encrypt and decrypt your own files: If you use encryption for messages or files which you alone intend to access, there is no need to create different keys. Single-key encryption is best for this. - Fast: Symmetric key encryption is much faster than asymmetric key encryption. - Uses less computer resources: Single-key encryption does not require a lot of computer resources when compared to public key encryption. Disadvantages - Need for secure channel for secret key exchange: Sharing the secret key in the beginning is a problem in symmetric key encryption. It has to be exchanged in a way that ensures it remains secret. - Too many keys: A new shared key has to be generated for communication with every different party. This creates a problem with managing and ensuring the security of all these keys. - Origin...

Words: 729 - Pages: 3