Explain the working and details of the protocol clearly

Assignment Help Basic Computer Science
Reference no: EM13867122

Answer -Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone's post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol.

Provide Response to

SSH is an acronym for Secure Shell. It was invented by the founder of SSH Communications Security, Tatu Ylönen ("About," 2015). It is used as a secure way to connect remotely between two network devices ("Configuring Secure Shell on Routers and Switches Running Cisco IOS," 2007). Both of the network devices are authenticated by a certificate and an encrypted password. It uses public key cryptography with an International Data Encryption Algorithm (IDEA) algorithm by default (Rouse, 2015).

Three major components comprise SSH. One is the Transport Layer Protocol. It authenticates servers. The second is the User Authentication Protocol. It authenticates clients. The last is the Connection Protocol which divides the tunnel between the two network devices into channels ("The Secure Shell (SSH) Protocol Architecture," 2005). Once authentication is complete, SSH gives a user the ability to have command line access to a UNIX or Linux system ("Explanation of SSH (Secure Shell Access)," 2015).

Provide a Response to

IPSec is a set of protocols developed by the  IETF (internet engineering task force) to support secure exchange of packets at the IP layer.  Ipsec has been deployed widely to implement virtual private networks.  There are two encryption modes supported by ipsec including transport mode and tunnel mode.  VPN's use the tunnel mode, which encrypts the payload and the header.  Transport mode only encrypts the payload but leaves the header less secure. (Beal, 2015) The sending and receiving devices need to be ipsec-compliant so that encryption and de-cryption can take place on both sides of the communication.  One additional note mentioned is that for IPsec to work, a public key is used through a protocol known as ISAKMP/Oakley. (Beal, 2015)

One compelling reason to move from IPv4 to IPv6 for internet use is that the framework for VPN is built into the IPv6 protocol for a more secure usage.

Reference no: EM13867122

Questions Cloud

Demilitarized zone (dmz) control standards : Demilitarized Zone (DMZ) Control Standards" Please respond to the following: 3.Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
Impact of the european union of the business environment? : What has been the impact of the European Union of the business environment?
Evaluate the ethics of the actions taken by siemens : Evaluate the ethics of the actions taken by Siemens with respect to Josephson, Six Pillars of Character and virtue decision making, as discussed in Chapter 1.
What is the factual basis of the plaintiffs claim : What is the factual basis of the plaintiff's claim? (It is helpful to associate a few key facts with the name of the case so you can quickly recall the case.)
Explain the working and details of the protocol clearly : Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When re..
What kind of manager is bella : Bella is head server at a chic Italian restaurant. What kind of manager is Bella
The purchaser lessor incurs no material initial direct costs : On January 1, 2010, the Orr Company sells heavy equipment to Foible Company for $3 million, then immediately leases it back. The relevant information is as follows:
What kind of departmentalization does this represent : Chaturanga is a yoga supply company that uses a business-to-business (B2B) model for selling yoga mats to yoga specialty stores. What kind of departmentalization does this represent
The nature of the expenditure : State with The reason The nature of the Expenditure in Each of the Following Case:-a) Freight on The New machinery Rs-4000 & Its Installation Cost Rs-2000

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Atmega128 is being used to monitor humidity inside test cham

Atmega128 is being used to monitor humidity inside test chamber 03. The device uses two sensors to have some fault tolerance. They are connected to ADC channels 0 and 1. The program uses the average and maximum error of the two values.

  Explain arithmetic-equality and quanti reasoning

Arithmetic, equality, and quanti reasoning. As it does simplication, automatic rewriting, and records sequent formulas in decision procedure database.

  Research on professional communication

You will individually research a topic on some aspect of professional communication. You will then prepare a 1-2 page outline using the standard outline format (shown below) that would be used in a training session. At the end of your outline yo..

  What are federal express estimated annual savings

1. Is technology by itself enough to ensure high-quality customer service? 2. What are federal express's estimated annual savings from using information technology? 3. What are a couple of examples of information technologies used by federal Expre..

  Start by identifying all the hazards and potential causes

Start by identifying all the hazards and potential causes of harm to the IT infrastructure and functionality (for example, what are you going to do if the VIU main web site goes down, or what happens if viruses get into VIU computer systems, or..

  Deriving logging information for chinese wall model

In the example of deriving required logging information for the Chinese Wall model, it is stated that the time must be logged.Why? Explain.

  Developing a strong supply chain management process

Developing a strong Supply Chain Management (SCM) process to match IS system upgrades would provide what advantage(s)? In general, what will this process look like?

  What is a lan how does the implementation of a lan work

You are employed as an engineer for a startup company. The company is now in the planning stage, and some important decisions must be made about what technology will be leveraged. The company is to be headquartered in Chicago, with small branch..

  Describe history of portfolio design in graphics design

Describe the history of portfolio design in the graphics design industry, and role of a graphic designer. Discuss current trends in portfolio design, and the possible future technologies for the industry.

  Xyz invitation printing have decided to merge into company

ABC Invitation Design and XYZ Invitation Printing have decided to merge into one company, A2Z Invitations. ABC is a virtual company with a proprietary website that allows customers to do some preliminary work on invitations and then consult with a de..

  How do you create a 4d array of int in c++

How do you create a 4D array of int in C++

  Discuss where nhs would fall on a technological acceptance

Develop an annotated bibliography containing ten references that can be used to evaluate five potential technological solutions for the scenario.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd