StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cracking time for different protocols - Essay Example

Cite this document
Summary
Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion. Difference in protocols is evident in their design (Miltchev et al., n.d., p. 2). For…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Cracking time for different protocols
Read Text Preview

Extract of sample "Cracking time for different protocols"

Running Head: CRACKING TIME FOR DIFFERENT PROTOCOLS CRACKING TIME FOR DIFFERENT PROTOCOLS By University nameCity, StateDate Cracking Time for Different Protocols Different protocols affect the hacking time required to break. Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion. Difference in protocols is evident in their design (Miltchev et al., n.d., p. 2). For example, TCP/IP has weak points that hackers can use to spoof IP addresses and attack TCP link requests within minutes.

Another example is widely used security protocols that do not normally entail the provisions for dependable authentication as part of the central protocol. SMTP, POP3, and IMAP4 are mail transfer protocols that enable hackers to forge emails effortlessly (Miltchev et al., n.d., p. 2). This is because these protocols do not need the usage of encoded that could make sure the privacy or discretion of email messages. Another example of how different protocol designs affect the time needed to hack is intrusion hacking.

Intruders use a range of attacking mechanisms to acquire access to networks. These mechanisms consists of password-cracking mechanisms, protocol cracking, and manipulation instruments (Miltchev et al., n.d., p. 7). Detection mechanisms used by intruders help identify alterations and alternatives that occur inside networks faster in TCP/IP than POP3 or SMTP protocols. An IT team called Nohl attempted to crack the OTA protocol in 2011 and realized its design is far more secure than any products by Microsoft or Linux.

Hacking the OTA protocol took the team longer to get through by sending commands to a number of SIM cards than cards with other types of security protocols such as Java (Olson, 2013). Protocol performance affects cracking time by decreasing the number of surged weak points in the respective network. Protocols with significantly better performances have environments with few weak points. In such settings, a well performing protocol dos not timeout frequently (Miltchev et al., n.d., p. 7). For example, a study conducted on protocol HACK found out that it was better than SACK because of SACK’s continuous timeouts.

On the other hand, HACK was able to maintain data stream to some degree. This performance was in fact six times better in terms of output than SACK in the existence of surge errors (Balan et al., 2002, p. 359). Another case of the cracking time of protocols depending on the frequency of weak points is 2013’s powerful supercomputer NUDT Tianhe-2 ability to crack a 128-bit AES code. Researchers estimated that the supercomputer would take over 333 million years to crack this key, which is significantly longer for breaking any code (Crawford, 2014).

High security protocols have an effect on performance, time, and mostly costs. This effect occurs because high security protocols identify packet loss because of hacking and recover the required data. The ability to detect these losses is an indication of the protocols’ dominion over performance (Olson, 2013). The flexibility of distinct cryptographic elements enables the usage of different protocols by numerous applications such as file-system encoding and user-level procedures. For instance, high security protocol IPsec takes far less time to achieve secure network communications than other popular security schemes.

However, this level of security comes at a cost that produces adequate performance for practicality. For instance, WEP policies cost the least and IPsec policies cause substantial costs but offer stronger performance within a short period (Miltchev et al., n.d., p. 1).ReferencesBalan, RK, Lee BP, Kumar, KRR, Jacob, L, Seah, WKG, and Ananda, AL 2002, ‘TCP HACK: a mechanism to improve performance over lossy links,’ Computer Networks, vol. 39, pp. 347–361.Crawford D 2014, PPTP vs L2TP vs OpenVPN vs SSTP vs IKEv2, Best VPN, viewed 21 January 2015, https://www.bestvpn.com/blog/4147/pptp-vs-l2tp-vs-openvpn-vs-sstp-vs-ikev2/Miltchev, S, Keromytis, AD, and Ioannidis, S n.d., A Study of the Relative Costs of Network Security Protocols, DARPA, pp. 1-8.Olson P 2013, SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phone, Forbes, viewed 21 January 2015, http://www.forbes.com/sites/parmyolson/2013/07/21/sim-cards-have-finally-been- hacked-and-the-flaw-could-affect-millions-of-phones/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cracking time for different protocols Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Cracking time for different protocols Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols
(Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words)
Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols.
“Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cracking time for different protocols

Computer Sciences - Assignment

This layer facilitates the transmission of packet using different communication protocols.... There are different types of protocols for handling this function.... hellip; These layers all have different functions that help with the movement of packets.... These layers all have different functions that help with the movement of packets.... It is encapsulated and changed into different forms until it reaches the network interface card in the physical layer, where it is sent as a signal, and the process of conversion takes place again....
3 Pages (750 words) Assignment

Pros and Cons of Directory-Based and Snoopy Protocols

The paper "Pros and Cons of Directory-Based and Snoopy protocols" compares two cache coherence protocols.... nbsp; Directory-based protocols are potentially viable in as far as, scalability is concerned, and they can scale distributed shared-memory multicore processors to thousands of processors.... The problem of cache coherence in hardware is reduced in today's microprocessors through the implementation of various cache coherence protocols....
10 Pages (2500 words) Literature review

Cisco Networking Assessment

uestion 2 (5 marks)What are the different types of collisions that can occur on an Ethernet networkBriefly explain each.... here are the types of collision where two packets are sent over the network at the same time, and this is handled by the CSMA/CD (Carrier Sense Multiple Access / Collision Detect) protocol and a 'Collision Domain'.... A Collision Domain happens when two devices on the network transmit at the same time (The TCP/IP Guide, 2005)....
6 Pages (1500 words) Essay

Development of Employee Management and Monitoring System

Communication has evolved over time from the use of smoke and drums to the use of modern-day telecommunication devices which are sophisticated, fast, efficient, effective, and able to transfer with credibility and authenticity huge amounts of information within a relatively short time....
12 Pages (3000 words) Essay

The Concept of Networking

The discussion emphasizes the principles and operations of layered communication protocols.... It also briefs about protocol stack, its working and packet headersIn computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP).... The layered communication protocols of networking are discussed hereunder....
9 Pages (2250 words) Essay

How We Use Worldwide Web

The HTTP is the only language used over the internet to transmit… The www also referred to as the web services allows different applications to communicate in exchanging information.... The www is an information sharing model that uses the HTTP protocol and which is developed over the internet....
5 Pages (1250 words) Essay

The Architectural Peculiarity of Australia

Thereupon, it is highly important to come up with a set of actions, protocols, and other activities aimed at protecting indigenous interests first of all.... Thereupon, it is highly important to come up with a set of actions, protocols, and other activities aimed at protecting indigenous interests, first of all.... In this respect, it is vital to mention that, like any kind of art, the architecture reflects on the main peculiarities of the time influenced by the technical and technological progress of mankind at the moment....
6 Pages (1500 words) Essay

Transmission Control Protocol in Wireless Networks

"Transmission Control Protocol in Wireless Networks" paper argues that the application layer protocols rely on TCP for data transmission, TCP has a few advantages in that it provides congestion control, offers reliable data transmission, provides error detection and flow control.... The application layer can be explained as an abstraction layer specifying the interface methods and shared protocols that are used in the communication network by communicating hosts....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us