StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Modern Cryptographc Protocol in Fixed and Mobile Communication - Research Paper Example

Cite this document
Summary
This paper 'Modern Cryptographc Protocol in Fixed and Mobile Communication' entails efficient validation of cryptographic protocols that are being used both in fixed as well as mobile communications. It can be affirmed that modern business transportation of information is not possible without mobile as well as fixed communication. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Modern Cryptographc Protocol in Fixed and Mobile Communication
Read Text Preview

Extract of sample "Modern Cryptographc Protocol in Fixed and Mobile Communication"

? Modern Cryptographc Protocol in Fixed and Mobile Communication This paper or research study entails efficient validation of cryptographic protocols that are being used both in fixed as well as mobile communications. With the advent of globalization, it can be affirmed that modern business transportation of information is not possible without mobile as well as fixed communication. Therefore, safety frames an important part for validation as well as determining the effectiveness of information. By taking into concern the aforesaid subject matter, this study further entails the description about the procedures or protocols that are being used and implemented in fixed as well as mobile communications for fostering effective communication. Introduction Cryptography represents the practice as well as the study of effective procedures and techniques enduring secure communication amid various technological instruments. It reveals about constructing as well as analyzing the protocols that mainly overwhelms the effect of adversaries. It is to be stated that cryptography is the synonym of encryption which signifies translation of information that is readable to a particular state that cannot be decoded. With this concern, this particular study entails the application of modern cryptography over fixed as well as mobile communication. It can be apparently observed that network security incorporates wide application of cryptographic protocols as well as algorithms in order to ensure secured and safe communication within different technological aspect. It is worth mentioning in this similar concern that cryptography tends to secure communication with respect to several significant areas such as internet, e -commerce as well as mobile communication by a greater level (Lundh, & Cortier, 2002). Cryptographic Protocols in Fixed Communications Cryptographic protocols are often viewed to be applied or implemented with the intention of preserving message privacy, reliability as well as sender’s identity. In relation to the aspect of cryptographic protocols, it mainly entails and incorporates three basic functions that encompass encryption, decryption as well as hashing. With the advent of globalization, there has been rapid acceleration in the usage of global networking as well as wireless communication. With this growing nature, there remains an increased demand for information protection. Furthermore, it has been revealed that communication being involved within modern business scenario entail both fixed as well as mobile communication. Moreover, it has also been observed that in order to keep pace with the competitive market, volume of information is also being accelerated. As a matter of fact, it can be apparently observed that traditional cryptography has been mainly designed as well as verified by applying or implementing informal as well as intuitive techniques. Furthermore, it can be viewed that absence of proper verification mainly lead towards occurring flaws as well as security errors. These errors further remain undetected and creates problem with respect to communication. Formal verification views at providing a rigid as well as a thorough medium for evaluating the effectiveness of cryptographic protocols (Chaabouni, Lipmaa, & Shelat, 2009). In order to determine the impact of cryptographic protocols especially in fixed communications, it can be affirmed that protocol authentication is usually accomplished by deductive reasoning on the basis of application. It has been revealed that protocol goals must be fixed accurately at the presence of flaws within protocol assumption. It can be viewed that if the protocol goals are not accurate, then validation concerning fixed communications cannot be succeeded. In this similar concern, certain advanced strategies need to be adopted as well as executed for improving as well as developing numerous equipments that simplifies the verification procedure by a considerable level. As a matter of fact, simplification of protocol procedure incorporates certain major components. Automation of logical application that requires conversion of maxims, theorems and inference rules of the applied logic within the language of proving-engine depicts the components of protocol measures. In the light of such formal validation tool, cryptographic protocols foster communication measures with respect to fixed as well as mobile network. It further enables the fixed as well as mobile communications to demonstrate security as well as trustworthiness with respect to determine the impact of cryptographic protocol especially on fixed communications. It has been viewed that cryptography protocols are often largely implemented in transferring data within certain fixed communications such as CD drive and DVD drive among others. These mediums represent fixed devices that are being applied to transfer data from one place to other fostering effective and efficient communication. To enable greater as well as smooth communication through the execution of various drivers, cryptography protocols incorporate Secured Socket Layers (SSL) or Transport Layer Security (TLS). In order to configure cryptographic protocols with respect to communication drivers entails the implementation of SSL connection as well as setting server parameters linked with SSL. It has been revealed that SSL is being implemented and applied by all web traffic with respect to electronic commerce. Thus, on the basis of the above discussion, it can be affirmed that the application of cryptography protocol in fixed devices fosters effective communication by a greater level (Lundh, & Cortier, 2002). Cryptographic Protocols in Mobile Communications Security represents a critical issue with respect to the conduct or the use of various mobile operations especially for the users as well as the providers. In this regard, mobile application endures special requirements as well as vulnerabilities. This is the reason for which mobile communications entail to foster effective and efficient communication at large. The basic and the most frequent problems that surround different mobile communications reveal the design of protocols for validation as well as proper management of process. Furthermore, it has been revealed that problem with respect to implementation of appropriate protocols for validation as well as management remains a problem within any environment. It can be apparently viewed that there pertain numerous cryptographic protocols with respect to mobile communications that have been designed to foster effective as well as efficient communication. Protocols in mobile communications are used or rather applied at the beginning of communication session that is known as ‘Key Establishment Protocol’. There exist certain factors that occur naturally with respect to mobile environment. In this similar context, ‘Heterogeneous Communication Path’ represents communication channel that is further divided into several parts that are relatively susceptible to attack. On the other hand, the aspect of ‘Computational Constraint’ reflects the existence of asymmetry between computational powers of mobile as well as base station. Concerning with the impact of cryptographic protocols in mobile applications, advanced design of validation as well as effective technological procedure prevents illegal access to the mobile network by a certain degree. Further, it provides mutual validation between base as well as mobile station. There exits various types of protocols with respect to mobile communications that embrace ‘Secret-key Cryptosystem’ and ‘Public –key Cryptosystem’. Furthermore, it has been revealed that ‘Secret-key Cryptography’ incorporates the utilization of a single key which is being used and applied for encryption as well as decryption by a considerable level (Paulson, 1998; Abadi, & Gordon, 1996; Lin, Harn, & Kumar, 1995). In this similar concern, the process which is being involved within ‘Secret-key Cryptography’ within the circumstance of modern cryptographic protocols in mobile communications can be better understood with the help of the following pictorial representation which has been portrayed below. Source: (Zhao, n.d.) In accordance with the facet of ‘Secret-Key Cryptography’, it can be stated that it provides a strong validation as well as functionality. This further reveals that knowledge can be shared secretly without hampering the validation procedure. It is worth mentioning that the application of secret-key based protocol supports various mobile stations of low power as well as light weight. Therefore, it can be affirmed that this type of protocol is applicable within high active mobile application. Concerning with secret-key protocol, there exist certain disadvantages to this application. Management of secret-key protocol implies a dangerous as well as complicated process. Another cryptographic protocol can be recognized to be ‘Public-key’ that incorporates two keys i.e. private key as well as public key. It has been further observed that encryption is executed through implementing public key, whereas decryption is executed through executing private key. A pictorial representation of the process incorporated in ‘Public-key’ protocol has been depicted hereunder (Zhao, n.d.; Coffey, Dojen & Flanagan, 2002). Source: (Zhao, n.d.) Concerning with the adoption as well as the implementation of public-key cryptography enabling digital signature, it can be stated that this particular concern can enable an individual or a person in marking a plain text by implementing private key and also in validating the mark by executing public key. According to the requirements of public-key protocol, it has been viewed that such protocol require certificate authority in order to make smooth execution of public key with respect to mobile as well as base station. Disadvantage of public key protocol reveals that it is not being fully utilized. This hindrance can be mainly because of the deprived computing power. Thus, it can be affirmed that the aforesaid protocols help in securing mobile based communications at large. Furthermore, it has been revealed that the frequency of cryptographic solutions is being accelerating within mobile communications by a greater level. In the recent scenario, it has been viewed that 3rd Generation Partnership Project (3GPP) which is a wireless local area network (WLLAN) is normally used for security purpose has provided numerous security specifications. As a matter of fact, it has been further revealed that application as well as implementation of public-key cryptography has eliminated the security problem by a certain degree. In recent scenario, advanced measures and strategies are being implemented to optimize public- key protocol (Park, 2001; Boyd & Park, 1999; Vijayakumar & Vijayalakshmi, 2008; Lin, Harn & Kumar, 1995). Conclusion On the basis of the overall analysis, it can be affirmed that fixed as well as mobile communications have accelerated in this present world of globalization and increased level of internationalization. It is worth mentioning in this similar concern that with the advent of globalization, communication has accelerated delivering better results and growth by a significant level. It has become quite necessary to adopt as well as to implement effective procedures and strategies that will secure the information which are being communicated. In this regard, cryptographic protocols are being implemented and applied to foster security within fixed as well as mobile communications. Concerning with the usage of cryptographic protocols, safe communique is crucial with respect to various vital aspects such as internet, e -business as well as mobile transportations. Furthermore, it can be stated that fixed as well as mobile networks are disposed to various attacks such as repeat, parallel session, data capture and rejection among others Fixed communications or rather fixed devices such as CD and DVD drive as well flash drive are often being used to communicate valuable information in an effectual manner. There remains a high chance of vulnerability with respect to transfer or transportation of information. Therefore, it can be affirmed that application and implementation of cryptographic protocol helps in deriving secured information. Furthermore, in mobile communications it can be viewed that secret-key protocol and public-key protocol are mainly adopted along with implemented for the purpose of providing effective security measures particularly to mobile based communications. Thus, it can be concluded that cryptographic protocols frame an important part with respect to fixed as well as mobile communications by a greater level. References Abadi, M., & Gordon, A. D. (1996). A calculus for cryptographic protocols the spi calculus. Apotheca, pp. 4-112. Boyd, C., & Park, D. G. (1999). Public key protocols for wireless communications. Research sponsored by Korea Telecom, pp. 1-10. Coffey, T., Dojen, R., & Flanagan, T. (2002). Verification of cryptographic protocols used in fixed and mobile networks. ERCIM News. Chaabouni, R., Lipmaa, H., & Shelat, A. (2009). Additive combinatorics anddiscrete logarithm based range protocols. EPFl. Lin, H. Y., & Harn, L., & Kumar, V. (1995). Authentication protocols in wireless communications. Computer Science Telecommunications Program, pp. 1-10. Lundh, H. C., & Cortier, V. (2002). How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Hubert Comon-Lunch, Veronique Cortier, pp. 29-44. Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocol. Overview of the Inductive Method, pp. 1-40. Park, D. G. (2001). Cryptographic protocols for third generation mobile communication systems. Doctor of Philosophy, pp. 1-184. Vijayakumar, P., & Vijayalakshmi, V. (2008). Effective key establishment and authentication protocol for wireless sensor networks using elliptic curve cryptography. Mobile and Pervasive Computing, pp. 151-156. Zhao, Y. (n.d.). Key establishment protocols for secure mobile communications. Privacy and Authentication for Wireless Local Area Networks. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Modern Cryptographc Protocol in Fixed and Mobile Communication Research Paper”, n.d.)
Modern Cryptographc Protocol in Fixed and Mobile Communication Research Paper. Retrieved from https://studentshare.org/information-technology/1483026-modern-cryptographc-protocol-in-fixed-and-mobile
(Modern Cryptographc Protocol in Fixed and Mobile Communication Research Paper)
Modern Cryptographc Protocol in Fixed and Mobile Communication Research Paper. https://studentshare.org/information-technology/1483026-modern-cryptographc-protocol-in-fixed-and-mobile.
“Modern Cryptographc Protocol in Fixed and Mobile Communication Research Paper”, n.d. https://studentshare.org/information-technology/1483026-modern-cryptographc-protocol-in-fixed-and-mobile.
  • Cited: 0 times

CHECK THESE SAMPLES OF Modern Cryptographc Protocol in Fixed and Mobile Communication

Security in Electronic Voting Systems

This is ensured by the use of modern technologies in the system design, such as the extensive markup language for the web representation of the data content and the extensive language transformation style sheets for the customization of the data presented.... The paper "Security in Electronic Voting Systems" deals with voting systems in universities for teaching and voting....
7 Pages (1750 words) Case Study

Delay-Tolerant Network Security

Unlike in the Transmission Control Protocol (TCP) where the communication is end-to-end, DTN uses a store and then forward approach.... Just like traditional mobile ad hoc networks, multi-hop transmission and open channels made DTNs vulnerable to security threats.... It has a new layer not common with other internet protocol layers called the bundle layer.... Below is a figure showing the difference between DTN and other internet protocol layers....
20 Pages (5000 words) Term Paper

Security Issues in Wireless Networks

1ac Wireless protocol'' discusses the security matters of using the wireless techniques....  … It will also be viewed on its differences with the older protocol 802.... This paper ''An Evaluation of the Recent IEEE 802.... It views the: an authentication enhancement, the key management and establishment and an encryption enhancement....
16 Pages (4000 words) Article

Impact of Technology on Society

All these technologies are equipped with wireless communication devices that will deliver value, convenience, quality health care and a better life for the patients.... In mobile computing, micro sensors are utilized for capturing health data, as they are small size intelligent devices that use works on low power consumption.... Hence mobile computing devices enable and facilitate caregivers and health care cooperative roles instant access to patient information on a common platform or knowledge base regardless of geographical location....
7 Pages (1750 words) Research Paper

Understanding Cryptography

Internet communication, wireless networking, mobile computing, and cloud computing are some of the trends shaping the computing and communication industry.... Therefore, designers and system users need to understand comprehensively the concept of cryptography and how it is applied in order to appreciate its effectiveness in securing wireless networks and communication.... According to Christoff (2009), cryptography is the study and practice of techniques for securing communication particularly in the presence of a third party (adversary)....
8 Pages (2000 words) Essay

Advanced Networks

The author of the paper describes the reasons for the inexhaustive availability of IP addresses, the encoding scheme with Cat 5, 100 Base-TX, time-space diagram, Distance vector routing algorithms, and Piconet and Scatternet in the context of Bluetooth networking … To deal with this problem, we have two modes of operation: DCF (Distributed Coordination Function) and PCF (Point Coordination Function)....
12 Pages (3000 words) Assignment

Cryptographic Protocols

Cryptographic protocols are methods use to ensure the security of communication systems such as wireless networks and multimedia networks.... Some of the factors to consider in choosing encryption include 1) Form of network-public or private 2) Type of communication network – multimedia/wireless network 3) other security measures in place.... he form of communication helps one in deciding how vulnerable a system is to intruders and therefore the choice of encryption....
9 Pages (2250 words) Report

The Challenges in the Internet of Things

BackgroundGiven that the nodes of IoT are of low communication speed, less computation power, low storage, and naturally heterogeneous, it requires forward and backward secrecy, smooth control of the data access, confidentiality, integrity, and scalable security algorithms.... Therefore, the thing in the IoT could be a human being having a heart for monitoring an implant, a car with in-built sensors that monitors the pressure and alert the driver when it is low, or other manufactured objects having a unique Internet protocol (IP) address that can be connected to the network to facilitate the transfer....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us