Explain the working and details of the protocol clearly

Assignment Help Basic Computer Science
Reference no: EM13867122

Answer -Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone's post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol.

Provide Response to

SSH is an acronym for Secure Shell. It was invented by the founder of SSH Communications Security, Tatu Ylönen ("About," 2015). It is used as a secure way to connect remotely between two network devices ("Configuring Secure Shell on Routers and Switches Running Cisco IOS," 2007). Both of the network devices are authenticated by a certificate and an encrypted password. It uses public key cryptography with an International Data Encryption Algorithm (IDEA) algorithm by default (Rouse, 2015).

Three major components comprise SSH. One is the Transport Layer Protocol. It authenticates servers. The second is the User Authentication Protocol. It authenticates clients. The last is the Connection Protocol which divides the tunnel between the two network devices into channels ("The Secure Shell (SSH) Protocol Architecture," 2005). Once authentication is complete, SSH gives a user the ability to have command line access to a UNIX or Linux system ("Explanation of SSH (Secure Shell Access)," 2015).

Provide a Response to

IPSec is a set of protocols developed by the  IETF (internet engineering task force) to support secure exchange of packets at the IP layer.  Ipsec has been deployed widely to implement virtual private networks.  There are two encryption modes supported by ipsec including transport mode and tunnel mode.  VPN's use the tunnel mode, which encrypts the payload and the header.  Transport mode only encrypts the payload but leaves the header less secure. (Beal, 2015) The sending and receiving devices need to be ipsec-compliant so that encryption and de-cryption can take place on both sides of the communication.  One additional note mentioned is that for IPsec to work, a public key is used through a protocol known as ISAKMP/Oakley. (Beal, 2015)

One compelling reason to move from IPv4 to IPv6 for internet use is that the framework for VPN is built into the IPv6 protocol for a more secure usage.

Reference no: EM13867122

Questions Cloud

Demilitarized zone (dmz) control standards : Demilitarized Zone (DMZ) Control Standards" Please respond to the following: 3.Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
Impact of the european union of the business environment? : What has been the impact of the European Union of the business environment?
Evaluate the ethics of the actions taken by siemens : Evaluate the ethics of the actions taken by Siemens with respect to Josephson, Six Pillars of Character and virtue decision making, as discussed in Chapter 1.
What is the factual basis of the plaintiffs claim : What is the factual basis of the plaintiff's claim? (It is helpful to associate a few key facts with the name of the case so you can quickly recall the case.)
Explain the working and details of the protocol clearly : Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When re..
What kind of manager is bella : Bella is head server at a chic Italian restaurant. What kind of manager is Bella
The purchaser lessor incurs no material initial direct costs : On January 1, 2010, the Orr Company sells heavy equipment to Foible Company for $3 million, then immediately leases it back. The relevant information is as follows:
What kind of departmentalization does this represent : Chaturanga is a yoga supply company that uses a business-to-business (B2B) model for selling yoga mats to yoga specialty stores. What kind of departmentalization does this represent
The nature of the expenditure : State with The reason The nature of the Expenditure in Each of the Following Case:-a) Freight on The New machinery Rs-4000 & Its Installation Cost Rs-2000

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The quad procedure

What is the largest value of X that can be used with the QUAD procedure (see page 172)? Hint: At no time may any temporary result exceed 65535

  Describe basic computer components and their uses

Explores computer literacy topics in a very basic, hands-on environment. Presents the fundamentals of computer hardware and software, the Internet, operating systems, and current application software within Microsoft Office Suite. Describe basic c..

  Create an educational degree information

Create an educational degree information website (Example: http://www.indwes.edu/Adult-Graduate/AS-Computer-Information-Technology/ ) in Expression Web that contains the following:

  Cloud computing

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization.

  Write in hexadecimal representation

what instructions do they represent - Suppose both signed and unsigned cases. Write them in hexadecimal representation.

  Describing online services provided by selected companies

Identify and briefly describe the online services provided by the selected companies (e.g. online catalogue search, online information search.

  Write a program that prompts the user to input a number

Write a program that prompts the user to input a number. the program should then output the number and a message saying whether the number is positive, negative, or zero

  Compare and contrast announced penetration testing

Compare and contrast announced penetration testing and unannounced penetration testing. Speculate on whether or not there are instances where unannounced testing is preferred over announced testing. Justify your resp

  What are the major obstacles in moving this forward

These are called code generators. Analyze the advantages and disadvantages of this trend. What are the major obstacles in moving this forward?

  Literature on corporate responsibility

Literature on corporate responsibility focuses on three areas of corporate responsibility: a company's relationship to its employees, to its particular industry, and to society in general.

  Write a version of sum pairs i that sums each component

Using SML write a version of sumPairs that sums each component of the pairs separately, returning a pair consisting of the sumof the first components and the sum of the second components

  Explain capacity of memory equal to size of external storage

This means that capacity of memory will be equal to size of external storage. How would this influence file structures? How would this influence storage devices?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd