Protocols for secure communications-cryptography, Computer Network Security

Assignment Help:

Protocols for Secure Communications

Securing Internet Communication by using S-HTTP and SSL

Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption to secure channel over public Internet. A Secure Hypertext Transfer Protocol (denoted by S-HTTP) is an extended version of Hypertext Transfer Protocol that is provided for encryption of individual messages between client and server across Internet. S-HTTP is the basic application of SSL over HTTP which allows encryption of information passing between computers by protected and secure connections virtually.

Securing E-mail by using S/MIME, PEM, and PGP


The Secure Multipurpose Internet Mail Extensions (S/MIME) is built on Multipurpose Internet Mail Extensions (MIME) encoding format by adding both encryption and authentication. Privacy Enhanced Mail (PEM) is given as standard to function with public key cryptosystems which uses 3DES symmetric key encryption. Pretty Good Privacy (PGP) technique uses IDEA Cipher for message encoding.

Securing Web transactions with SET, SSL, and S-HTTP

The Secure Electronic Transactions (SET) is developed by MasterCard and VISA in
The year 1997 to provide protection from electronic payment fraud this uses DES to encrypt credicard information transfers. It provides security for Internet-based credit card transactions and credit card swipe systems in retail stores both.

Securing TCP/IP with IPSe

IPSec is an open source protocol to secure communications across any IP based network. IPSec is designed to protect integrity of data, user confidentiality, and authenticity at IP packet level.

It combines several different cryptosystems: Diffie-Hellman, public key cryptography; digital certificates and bulk encryption algorithms. In the IPSec, IP layer security can be attained by use of application header (AH) protocol or encapsulating security payload (ESP) protocol.

Securing TCP/IP with PGP

Pretty Good Privacy (PGP) is a hybrid cryptosystem designed in the year 1991 by Phil Zimmermann. It is the combined best available cryptographic algorithms to become open source de facto standard for encryption and authentication of electronic mail and file storage applications. It is low cost commercial PGP versions are available for several platforms. Table given below depicts PGP function.

 

2321_Protocols for secure communications-cryptography.png


Related Discussions:- Protocols for secure communications-cryptography

Compare and contrast between block and stream ciphers, Problem 1 Solve ...

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Hardware trojan detection, how to form the trojan integrated cirucit and wh...

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Simplex data exchange, Simplex data exchange Simplex communication def...

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Explain rsa encryption, (a) Describe RSA encryption. (b) For an RSA encr...

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Determine the round trip time, QUESTION a) Determine the RTT (round tr...

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

TCP/ ip, Q1 (15 marks, 5 marks each part): This question has three parts: ...

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Http protocol, Question (a) Name 3 popular electronic mail access prot...

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Rsa block and vernam stream ciphers, RSA Block and Vernam Stream Ciphers ...

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd