Skip to main content

Applications of Cryptography

Cryptography applications

Cryptography can be applied in data communications for safety and security purposes. This can be seen in form of IPSec, SSL and PGP.

IPSec (Internet Protocol Security)

This is a set of protocols designed to protect the integrity and authenticity of data while moving across the network. This set of rules (IPSec) work at the layer 3 of the OSI model. Wait!!! what is layer 3..... brain cracking.... searching my database..... THE NETWORK LAYER! Yeaaaahhhh! If we can recall, network layer deals with IP addressing(logical address). So this protocol is implemented on the IP addressing system? Yeah! This security application uses some sets of rules which govern how data is been successfully flowing over a network.

The earliest cryptographic applications are implemented on the layer 7 Application layer. IPSec came into the world with its layer 3 implementation, unlike it predecessors where the policy is been implemented at the Application layer, this security policy is done right before the data leaves or enter into the network. One of its feature that makes it successful is its ability to work without any major changes to the implemented computer system. This security policy is found very helpful in remote user access through dial-up connections, private networks even VPN virtual private network, wait! Whats that? I will surely dedicate an article on VPN just stay in touch!

IPSec Protection Mechanisms

This security policy uses two types of mechanism to protect data.
Authentication Header
Encapsulation security payload

Authentication header (AH): This provides an integrity and authentication of datagrams between two systems or devices.

This technology uses hashing. As already discussed hashing is a way of encryption which helps the receiver to authenticate the integrity of the data received. Any alteration of data after hashing is applied will surely be identified.

Authentication header is applied to the entire datagram except the addressing header which has to change during transit. When data is been sent over a network, it follows different hops (router interface that forward data to reach its destination) thus making the next hop address changes over transit. TTL Time to leave (this is a mechanism that tells the router its time to release packet or packet stayed too long in the network it needs to send it to the right direction to reach its destination or discarded, if it reaches zero before reaching its destination the data is discarded) changes over time so this portion too need not to be hashed.

How do AH works?

>>1>> The IP header  and the payload is hashed
wait!!! what is IP header? This is a prefix in an IP packet which describes information like, IP version, source and destination IP address, TTL etc.

>>2>> The hash is used to built a new AH header, which is attached to the original packet.

>>3>> The packet is transmitted to the IPSec  peer router.

>>4>> The peer router will the has the IP header and the payload, extracts the transmitted hash from the AH header and compares the two hashes. As you already know they must exactly match, even if one or atom (laughs) bit of data is altered the hash will never be the same. Thus making the data not original.

Encapsulation security payload (ESP): This provide a way to authenticate data as well as encrypt data. It provides confidentiality by encrypting the IP packet layer, data origin authentication, integrity, optional antire-replay service (this is a sub-protocol of IPSec, its main aim is to guard the integrity of data, by protecting datagram from been altered by an intruder) and limited traffic flow confidentiality by limiting traffic flow analysis. ESP supports the symmetric encryption algorithms which is already discussed.

The information that contains each of the mentioned IPSec mechanisms can be found in the IP header which follows the IP packet.

References: ciscopress Wikipedia Sybex CEH

To be continued

Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in India onl