StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Encryption Keys Used to Ensure Secure Communication Sessions - Essay Example

Cite this document
Summary
The paper "Encryption Keys Used to Ensure Secure Communication Sessions" states that protocols assure the security of communicating parties by use of certificates. Protocols at the transport layer ensure data confidentiality and integrity due to the presence of authentication codes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Encryption Keys Used to Ensure Secure Communication Sessions
Read Text Preview

Extract of sample "Encryption Keys Used to Ensure Secure Communication Sessions"

Public key encryption is intended to use two keys; one private key and another public key. Each key is assigned to either encrypt or decrypt. On the other hand, single-key encryption only uses a single secret key for both the encryption and decryption of messages. A hybrid of the two that is single key and public key encryption is what the modern encryption model entails to help establish reliable secure sessions. According to De & Yung (2006, 127), session keys help enhance the security of a system in cases where two parties have an encrypted connection to a third party. By use of these session keys, the third party can deliver keys to the other two parties on the encrypted links.

Session keys are established by the use of Diffie-Hellman key exchange which enables the secret exchange of keys between two users on a communication channel by the use of exchange algorithms. This way of key generation does not require the presence of a central authentication server or any key distribution center. These two users maintain a secured encrypted message through a partial share of information. Some data is privately stored while some are publicly given for the other party to use. Using exchange algorithms, the two parties can use the publicly aired data to encrypt hidden messages from senders on a crowded communication channel (De & Yung 2006, 127). User 1 computes the key using the public data given by user 2 and vice vise. Both calculations will eventually yield similar results indicating a common interpretation.

Kerberos V4 uses session keys to help maintain a secured communication protocol (Bao, Deng & Zhou 2004, 30). Kerberos v4 is useful in verifying users at workplaces who would wish to access services within a network. Session keys used in Kerberos would restrict access only to identified and authorized users and would accurately authenticate requests for use. These authentication procedures make the use of session keys very relevant in Kerberos. It will be almost impossible for another side user to communicate with the server since the given session key is encrypted using the password of the authorized client.

However, there also poses a risk of an attacker replaying an old message to the server since the same ticket is used repeatedly. Despite the inherent risk of attack, in a new version of Kerberos V5, clients and users could negotiate a new session key thus reducing the risk of attack through replay messages.
In the secured socket layers, the areas that involve the use of session keys within the SSL protocol suite are the cipher suite and random exchange. The random exchange involves a random number that is sent by both parties, which will later create secret session keys. According to Oppliger (2009, 84), the sender’s DSS or RSA keys sign the exchange keys. The respondent will then authenticate the signatures using public keys. Despite the level of security from the encryption protocol, there is also a possibility of network burden as session keys delay the exchange of information.
Part 2
Application layer
Encrypting information at the application layer is advantageous because it protects sensitive information and controls access to the information in a more convenient way than cryptography at any other level. This is because this layer identifies sensitive data and offers security selectively to the sensitive data. This layer knows the user's entitlements and roles, therefore, provides protection accordingly. According to Deng & Zhou (2004, 127), this is different from cryptography at the network layer where there is no selective protection because of unknown users’ entitlements. Another advantage of encryption at this level is that the management can tailor the types of protection to suit their specific application needs.
Disadvantages of cryptography at this stage include the application requiring modifications during changes and thus may be inappropriate since changing the application requires highly technical skills which may be unavailable at a specific time. Encryption at this level affects system performance since it is CPU intensive and therefore uses the majority of system resources thus lowering the system’s performance. In addition, where different systems share common data, encryption at this level may cause the breaking down of systems when adding cryptographic protocols to another system.

Network layer
Kahate (2003, 363) states that implementation of encryption at this layer occurs at sources and destination nodes, for instance, IP addresses. The cryptographic protocols encapsulate the network packets within the IP packets. One major advantage of this encryption is that it is not concerned with the details of the data transmitted. The end user cannot witness this encryption. Besides, this level of encryption does not interfere with other cryptographic protocols.
Disadvantages include users being unaware of security breaks which affect negatively other users. In addition, selective protection is impossible because the protocols are unaware of the users’ entitlements and roles. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1624921-network-and-internet-security
(Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 Words - 1)
https://studentshare.org/information-technology/1624921-network-and-internet-security.
“Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/information-technology/1624921-network-and-internet-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Encryption Keys Used to Ensure Secure Communication Sessions

Encryption Exploitation Technologies

With advancement in information and communication technology and the implementation of information systems within organizations, data security has become a serious issue.... It is essentially used for secure transmission of data.... This research paper gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies.... Symmetric Encryption Symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies....
6 Pages (1500 words) Research Paper

Modern Cryptographc Protocol in Fixed and Mobile Communication

Introduction Cryptography represents the practice as well as the study of effective procedures and techniques enduring secure communication amid various technological instruments.... It is worth mentioning in this similar concern that cryptography tends to secure communication with respect to several significant areas such as internet, e -commerce as well as mobile communication by a greater level (Lundh, & Cortier, 2002).... It can be apparently observed that network security incorporates wide application of cryptographic protocols as well as algorithms in order to ensure secured and safe communication within different technological aspect....
7 Pages (1750 words) Research Paper

Digital Encryption Standard

The paper "Digital Encryption Standard" highlights that Alice would be getting the session key for communication with Eve and not for Bob.... It is easy to implement The algorithm used in the RC4 initialization phase is a key scheduling algorithm(KSA).... Digital encryption Standard (DES) is a symmetric block cipher that encrypts and decrypts data in 64-bit blocks using a 56-bit key.... ow K takes: Answer: It is not possible to perform encryption operations in parallel on multiple blocks of plaintext in DES CBC mode because in Ciber-Block-Chaining(CBC) mode each block of plaintext is XORed with the previous ciphertext block before being encrypted and hence each ciphertext block is dependent on all plaintext blocks processed up to that point....
12 Pages (3000 words) Research Paper

Encryption of Data at Rest and in Transit - OpenSSL and Disk Utility

he public key, on the other hand, is used to facilitate the exchange of the private key.... Even though encryption of data does not necessarily restrict the access of data it however does ensure that a hacker is not able to interpret encrypted data and hence use it for personal benefit.... Data in transit usually refers to data that is on the move, whereas data at rest refers to stored static data that is used on a few numbers of machines.... The key is then used by the sender to encrypt the message....
9 Pages (2250 words) Essay

Improving Palm Chemist Systems To Cope With The Expansion Needs

With this demand, it is no doubt that the firm requires a technological system that is secure and efficient to ensure timely distribution of its products.... The firm therefore requires a secure system that connects the entire departments and track sales of all the products....
45 Pages (11250 words) Essay

The Nature of Encryption Exploitation Technologies

An encryption algorithm the word used to describe the mathematical formula.... With advancements in information and communication technology and the implementation of information systems within organizations, data security has become a serious issue.... It is essentially used for the secure transmission of data.... This coursework "The Nature of Encryption Exploitation Technologies" gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies, the processes of converting original information into ciphertext....
6 Pages (1500 words) Coursework

International Workshop on Security Protocols

These keys work in tandem to ensure an encrypted connection.... he three keys are then used to establish the SSL connection i.... They ensure the secure delivery of data between two parties when used with communication protocols.... It is commonly used in conjunction with the transfer layer protocol.... The installation instructions depend on the server OS being used.... (CHRISTIANSON, 2011)SSL certificates exist in pairs and have two keys; a public and a private key....
8 Pages (2000 words) Report

Learning with Errors Problem

Learning with error is widely used in cryptography to ensure the security and correctness of data.... It is mostly used as basis for public key encryption schemes, identity based encryption and various forms of leakage resilient encryption.... encryption takes place to make plain text unreadable by unauthorized personnel.... Its implementation in cryptography reduces the complexity of encryption.... Learning with error will enable the cryptosystem to come up with the public key, private key to carry out decryption and encryption....
10 Pages (2500 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us