Explain the working and details of the protocol clearly

Assignment Help Basic Computer Science
Reference no: EM13867122

Answer -Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone's post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol.

Provide Response to

SSH is an acronym for Secure Shell. It was invented by the founder of SSH Communications Security, Tatu Ylönen ("About," 2015). It is used as a secure way to connect remotely between two network devices ("Configuring Secure Shell on Routers and Switches Running Cisco IOS," 2007). Both of the network devices are authenticated by a certificate and an encrypted password. It uses public key cryptography with an International Data Encryption Algorithm (IDEA) algorithm by default (Rouse, 2015).

Three major components comprise SSH. One is the Transport Layer Protocol. It authenticates servers. The second is the User Authentication Protocol. It authenticates clients. The last is the Connection Protocol which divides the tunnel between the two network devices into channels ("The Secure Shell (SSH) Protocol Architecture," 2005). Once authentication is complete, SSH gives a user the ability to have command line access to a UNIX or Linux system ("Explanation of SSH (Secure Shell Access)," 2015).

Provide a Response to

IPSec is a set of protocols developed by the  IETF (internet engineering task force) to support secure exchange of packets at the IP layer.  Ipsec has been deployed widely to implement virtual private networks.  There are two encryption modes supported by ipsec including transport mode and tunnel mode.  VPN's use the tunnel mode, which encrypts the payload and the header.  Transport mode only encrypts the payload but leaves the header less secure. (Beal, 2015) The sending and receiving devices need to be ipsec-compliant so that encryption and de-cryption can take place on both sides of the communication.  One additional note mentioned is that for IPsec to work, a public key is used through a protocol known as ISAKMP/Oakley. (Beal, 2015)

One compelling reason to move from IPv4 to IPv6 for internet use is that the framework for VPN is built into the IPv6 protocol for a more secure usage.

Reference no: EM13867122

Questions Cloud

Demilitarized zone (dmz) control standards : Demilitarized Zone (DMZ) Control Standards" Please respond to the following: 3.Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
Impact of the european union of the business environment? : What has been the impact of the European Union of the business environment?
Evaluate the ethics of the actions taken by siemens : Evaluate the ethics of the actions taken by Siemens with respect to Josephson, Six Pillars of Character and virtue decision making, as discussed in Chapter 1.
What is the factual basis of the plaintiffs claim : What is the factual basis of the plaintiff's claim? (It is helpful to associate a few key facts with the name of the case so you can quickly recall the case.)
Explain the working and details of the protocol clearly : Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When re..
What kind of manager is bella : Bella is head server at a chic Italian restaurant. What kind of manager is Bella
The purchaser lessor incurs no material initial direct costs : On January 1, 2010, the Orr Company sells heavy equipment to Foible Company for $3 million, then immediately leases it back. The relevant information is as follows:
What kind of departmentalization does this represent : Chaturanga is a yoga supply company that uses a business-to-business (B2B) model for selling yoga mats to yoga specialty stores. What kind of departmentalization does this represent
The nature of the expenditure : State with The reason The nature of the Expenditure in Each of the Following Case:-a) Freight on The New machinery Rs-4000 & Its Installation Cost Rs-2000

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd