Skip to main content

Applications of Cryptography

Cryptography applications

Cryptography can be applied in data communications for safety and security purposes. This can be seen in form of IPSec, SSL and PGP.

IPSec (Internet Protocol Security)

This is a set of protocols designed to protect the integrity and authenticity of data while moving across the network. This set of rules (IPSec) work at the layer 3 of the OSI model. Wait!!! what is layer 3..... brain cracking.... searching my database..... THE NETWORK LAYER! Yeaaaahhhh! If we can recall, network layer deals with IP addressing(logical address). So this protocol is implemented on the IP addressing system? Yeah! This security application uses some sets of rules which govern how data is been successfully flowing over a network.

The earliest cryptographic applications are implemented on the layer 7 Application layer. IPSec came into the world with its layer 3 implementation, unlike it predecessors where the policy is been implemented at the Application layer, this security policy is done right before the data leaves or enter into the network. One of its feature that makes it successful is its ability to work without any major changes to the implemented computer system. This security policy is found very helpful in remote user access through dial-up connections, private networks even VPN virtual private network, wait! Whats that? I will surely dedicate an article on VPN just stay in touch!

IPSec Protection Mechanisms

This security policy uses two types of mechanism to protect data.
Authentication Header
Encapsulation security payload

Authentication header (AH): This provides an integrity and authentication of datagrams between two systems or devices.

This technology uses hashing. As already discussed hashing is a way of encryption which helps the receiver to authenticate the integrity of the data received. Any alteration of data after hashing is applied will surely be identified.

Authentication header is applied to the entire datagram except the addressing header which has to change during transit. When data is been sent over a network, it follows different hops (router interface that forward data to reach its destination) thus making the next hop address changes over transit. TTL Time to leave (this is a mechanism that tells the router its time to release packet or packet stayed too long in the network it needs to send it to the right direction to reach its destination or discarded, if it reaches zero before reaching its destination the data is discarded) changes over time so this portion too need not to be hashed.

How do AH works?

>>1>> The IP header  and the payload is hashed
wait!!! what is IP header? This is a prefix in an IP packet which describes information like, IP version, source and destination IP address, TTL etc.

>>2>> The hash is used to built a new AH header, which is attached to the original packet.

>>3>> The packet is transmitted to the IPSec  peer router.

>>4>> The peer router will the has the IP header and the payload, extracts the transmitted hash from the AH header and compares the two hashes. As you already know they must exactly match, even if one or atom (laughs) bit of data is altered the hash will never be the same. Thus making the data not original.

Encapsulation security payload (ESP): This provide a way to authenticate data as well as encrypt data. It provides confidentiality by encrypting the IP packet layer, data origin authentication, integrity, optional antire-replay service (this is a sub-protocol of IPSec, its main aim is to guard the integrity of data, by protecting datagram from been altered by an intruder) and limited traffic flow confidentiality by limiting traffic flow analysis. ESP supports the symmetric encryption algorithms which is already discussed.

The information that contains each of the mentioned IPSec mechanisms can be found in the IP header which follows the IP packet.

References: ciscopress Wikipedia Sybex CEH

To be continued

Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l...

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in...

Turn your Word doc into a PDF with a live table of contents

A long report needs to be broken up into sections. Readers will want shortcuts to the chapters that most interest them. So, if you’re distributing your reports as PDFs, you’ll want live tables of contents in which readers can easily go to the chapters they want to read. Fortunately, this is easy to do in Word 2010 or 2013 (I haven’t tested this in earlier versions). First of all, you need to set up your document properly. Use Word’s outline styles— Heading 1, Heading 2 , and so on—to organize your report. For instance, you might want to assign large section titles as Heading 1, chapter titles as Heading 2, sub-chapters as Heading 3, and so on. By the way, using these headings has other advantages. You can select View>Outline and work on your document as a collapsible outline. Also, the left tab of the Navigation pane uses these styles. But back to the table of contents. When you’re ready to distribute your document, select the References tab and click...