Saturday, June 22, 2019
Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 words - 1
Network and Internet Security - Essay ExampleOn the other hand, the single key encryption nevertheless intakes a single secret key for both encryption and decryption of messages. A hybrid of the two that is single key and public key encryption is what the modern encryption model entails to help establish reliable secure sessions. According to De & Yung (2006, 127), session keys help enhance security of a system in cases where two parties have an encrypted connections to third party. By use of these session keys, the third party can deliver keys the other two parties on the encrypted links.Session keys be established by use of Diffie-Hellman key exchange which enables the secret exchange of keys between two users on a communication channel by the use of exchange algorithms. This way of key generation does not required the presence of a central authentication server or any key diffusion center. These two users maintain a secured encrypted message through a partial share of informat ion. Some data is privately stored while some is publicly presumptuousness for the other party to use. Using exchange algorithms, the two parties can use the publicly aired data to encrypt hidden messages from senders on a displace communication channel (De & Yung 2006, 127). User 1 computes the key using the public data given by user 2 and viceviser. Both calculations will finally yield similar results indicating a common interpretation.Kerberos V4 uses session keys to help maintain a secured communication protocol (Bao, Deng & Zhou 2004, 30). Kerberos v4 are useful in verificatory users at work places who would wish to access services within a network. Session keys use in Kerberos would restrict access only to identified and true users and would accurately authenticate requests for uses. These authentication procedures make the use of session keys become very relevant in Kerberos. It will be almost impossible for some other side user to communicate with the server since the given session key is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.