Explain the working and details of the protocol clearly

Assignment Help Basic Computer Science
Reference no: EM13867122

Answer -Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone's post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol.

Provide Response to

SSH is an acronym for Secure Shell. It was invented by the founder of SSH Communications Security, Tatu Ylönen ("About," 2015). It is used as a secure way to connect remotely between two network devices ("Configuring Secure Shell on Routers and Switches Running Cisco IOS," 2007). Both of the network devices are authenticated by a certificate and an encrypted password. It uses public key cryptography with an International Data Encryption Algorithm (IDEA) algorithm by default (Rouse, 2015).

Three major components comprise SSH. One is the Transport Layer Protocol. It authenticates servers. The second is the User Authentication Protocol. It authenticates clients. The last is the Connection Protocol which divides the tunnel between the two network devices into channels ("The Secure Shell (SSH) Protocol Architecture," 2005). Once authentication is complete, SSH gives a user the ability to have command line access to a UNIX or Linux system ("Explanation of SSH (Secure Shell Access)," 2015).

Provide a Response to

IPSec is a set of protocols developed by the  IETF (internet engineering task force) to support secure exchange of packets at the IP layer.  Ipsec has been deployed widely to implement virtual private networks.  There are two encryption modes supported by ipsec including transport mode and tunnel mode.  VPN's use the tunnel mode, which encrypts the payload and the header.  Transport mode only encrypts the payload but leaves the header less secure. (Beal, 2015) The sending and receiving devices need to be ipsec-compliant so that encryption and de-cryption can take place on both sides of the communication.  One additional note mentioned is that for IPsec to work, a public key is used through a protocol known as ISAKMP/Oakley. (Beal, 2015)

One compelling reason to move from IPv4 to IPv6 for internet use is that the framework for VPN is built into the IPv6 protocol for a more secure usage.

Reference no: EM13867122

Questions Cloud

Demilitarized zone (dmz) control standards : Demilitarized Zone (DMZ) Control Standards" Please respond to the following: 3.Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
Impact of the european union of the business environment? : What has been the impact of the European Union of the business environment?
Evaluate the ethics of the actions taken by siemens : Evaluate the ethics of the actions taken by Siemens with respect to Josephson, Six Pillars of Character and virtue decision making, as discussed in Chapter 1.
What is the factual basis of the plaintiffs claim : What is the factual basis of the plaintiff's claim? (It is helpful to associate a few key facts with the name of the case so you can quickly recall the case.)
Explain the working and details of the protocol clearly : Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When re..
What kind of manager is bella : Bella is head server at a chic Italian restaurant. What kind of manager is Bella
The purchaser lessor incurs no material initial direct costs : On January 1, 2010, the Orr Company sells heavy equipment to Foible Company for $3 million, then immediately leases it back. The relevant information is as follows:
What kind of departmentalization does this represent : Chaturanga is a yoga supply company that uses a business-to-business (B2B) model for selling yoga mats to yoga specialty stores. What kind of departmentalization does this represent
The nature of the expenditure : State with The reason The nature of the Expenditure in Each of the Following Case:-a) Freight on The New machinery Rs-4000 & Its Installation Cost Rs-2000

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the least common multiple of the pairs of integers

Find the least common multiple (lcm) of the pairs of integers.

  Given a scanner of double values

public double[] stats(Scanner scanner) Given a Scanner of double values, return an array of capacity three that has the maximum value in the Scanner as the value in result[0]

  Use the above grammar to derive the string

Here is a context-free grammar that can be used to generate algebraic expressions via the arithmetic operators (addition, subtraction, multiplication, and division), in the variables p, q, and r.

  Can gained competitive advantages be sustained

What are some internal (e.g. organisational, individual, and management factors) and external factors (e.g. market, industry, social, economic, technological and political/policy factors) influencing the success or failure of organisations' attemp..

  Use a loop to traverse each character in the input string

Write a program in the file freq.cpp which reads a string from the user and computes the frequency of each letter that appears in the string.

  Types of legal ownership

Types of Legal Ownership

  What happens as n increases

Run the above code for n = 30; 40; and 50. What happens as n increases? What do you think this implies about big-O run time of the algorithm?

  What is the const keyword in c++ and why would you use

What is the const keyword in C++? Why would you use the const keyword

  Write a recursive method definition for a static method

Write a recursive method definition for a static method that has one parameter n of type int and that returns the nth Fibonacci number. F0 is 1, F1 is 1, F2 is 2, F3 is 3, F4 is 5. And in general Fi+2 = Fi + Fi+1 for I = 0,1,2,...

  Develop timeline on computer using microsoft word

Use Microsoft Word, Excel or PowerPoint to develop timeline on computer. Create your own timeline and take a picture, saving file on computer as .jpg or .gif.

  Java application that prints the table

Create a JAVA application that prints the table using the sqrt () method in the Math class. Use a for loop to produce the output results.

  Differentiate centralised and distributed data processing

Explain the differences between centralised and distributed data processing. Describe the pros and cons of each approach.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd