Preview

Modern Cryptographic Protocols in Fixed and Mobile Communication.

Powerful Essays
Open Document
Open Document
2890 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Cryptographic Protocols in Fixed and Mobile Communication.
Introduction
They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.
Secure Socket Layer (SSL):
SSL protocol is a cryptographic protocol used for establishing a secure communication channel between two entities (Martin, 2012). Secure socket layer operates at the transport layer of the internet protocol suite. Though SSL provides transport layer security, it site immediately above Transmission Control Protocol (TCP) in the protocol stack, therefore it can be said that the SSL provides session layer security in the OSI model (Kak, 2012). SSL was developed by Netscape in 1995 and was used with the Navigator browser; it was developed to provide secure authenticated connection between client\browsers and servers (Martin, 2012). Later Internet Engineering Task Force (IETF) took its responsibility.

The SSL protocol has three basic properties:
a. Symmetric cryptography is used to encrypt data and public key cryptography is used to establish symmetric key (Freier, Karlton & Kocher, 2011).
b. Peer’s identity is authenticated using digital signatures.
c. Data origin authentication and peer authentication is checked using a keyed Message Authentication Code (MAC). Secure hash functions are used as components of MAC’s and digital signatures.
The goals of SSL protocol in order of their priority are:
a. Cryptographic security: SSL is used to establish secure communication channel between a client and a server (Freier, Karlton & Kocher, 2011).
b. Interoperability: different programmers should be able to develop their application



References: Dierks, T. and Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc5246 Frankel, S Freier, A., Karlton, P., & Kocher, P., (2011, August). The secure sockets layer (SSL) protocol version 3.0. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc6101 Harris, S Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf Manangi, S Martin, K. M. (2012). Everyday cryptography: Fundamental principles and applications. Oxford, New York: Oxford University Press. Rescorla, E. and Schiffman, A. (1999). The secure hypertext transfer protocol. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc2660 Rhee, M Tilborg, H. (2002). Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers. Yloven, T. & Lonvick, Ed. C. (2006). Secure shell (SSH) protocol architecture. Internet engineering task force. Retrieved from: http://www.ietf.org/rfc/rfc4251.txt

You May Also Find These Documents Helpful