Preview

network cryptography

Powerful Essays
Open Document
Open Document
4974 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
network cryptography
Cryptographic Authentication for Real-Time Network Protocols1,2
David L. Mills3
Abstract
This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synchronization and event scheduling applications. It outlines the design requirements of these protocols and why these requirements cannot be met using conventional cryptography and algorithms. It proposes a new design called autokey, which uses a combination of public-key cryptography and a psuedo-random sequence of one-way hash functions. Autokey has been implemented for the
Network Time Protocol (NTP), but it can be adapted to other similar protocols. The paper describes the protocol operations, data structures and resources required for autokey, as well as a preliminary vulnerability assessment. ification is not yet complete, but transition documents are available [7] which describe the new features. The
NTP Version 4 reference implementation now under test supports most of these features, including the authentication scheme described in this paper. Additional information can be found at the NTP home page http:// www.eecis.udel.edu/~ntp and the author’s home page http://www.eecis.udel.edu/~mills. AMS keywords: cryptography 94A60, data encryption
68P25
1. Introduction
The Network Time Protocol (NTP) [5] is widely deployed in the Internet to synchronize computer time to national standards. The current NTP population includes over 230 primary servers and well over 100,000 secondary servers and clients. It provides comprehensive mechanisms to access national time and frequency dissemination services, organize the hierarchical network server-client topology and adjust the clock of each participant. It uses redundant servers, diverse network paths and crafted algorithms which cast out incorrect servers and minimize errors due to network latencies and clock frequency variations. The protocol can operate in peerpeer,



References: Mills, D.L. Internet time synchronization: the Network Time Protocol. IEEE Trans. Communications COM-39, 10 (October 1991), 1482-1493.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Features: NET, Bitlocker Encryption, BITS, Remote Assistance, SMTP Server, SNMP, telnet server & client, failover, NLB, TFTP, Windows Server Backup, WINS, Powershell…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    3. the client connection accept to the server and replay to read the system date and time.…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    After selecting a protocol best suited comparing the earlier studies relevant on the field, it is required to make an assessment of verification and properly understand in depth about the protocol to develop a suitable algorithm targeting it. Therefore using a suitable experimental environment, the protocol should be simulated under various conditions and…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    a) client-server: dedicated servers, fixed IP, not scalable, single-point-of-failure. (E.g., Web, FTP, Telnet, and e-mail)…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IST 220

    • 369 Words
    • 2 Pages

    6: Describe the RTS/CTS protocol and when does it make sense to use? (7 pts)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    * Sever: is specialist computer hardware system and were built very high hardware like workstation computer (High-speed processor, high-end graphics, large RAM, Hard-drivers and is most powerful. And server don’t use normal operating system, they use operating system server( Microsoft windows server , apple server , linux server) for control group computer which is in large business , school , technology company , because they have a lot of computer and they provide service to other computer (can called workstation). Some type of server: web server, mail server, gaming server, servers for the central management and storage of files and data and other kind of server.…

    • 1846 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the larger scaled programs, the N Tier client/server architecture needs to be implemented. This client/server structure is able to increase to include a mid-level or business level tier, this structure has a server for…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Over four months, a very short period of time, a small accounting firm grew from five employees to fifty. The existing network architecture could no longer support the exponential growth. Peer-to-Peer networks work very well in a small office environment. Once the ratio of employees exceeds around five employees resources, file storage and a plethora of other network disasters begin. The obvious solution was to recommend a change. As explained in the proposal the proposed upgrade from a peer-to-peer network architecture to client/server was an imminent necessity.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are three different fundamental application architectures. In host-based networks, the server performs virtually all of the work. In client-based networks, the client computer does most of the work; the server is used only for data storage. In client-server networks, the work is shared between the servers and clients. The client performs all presentation logic, the server handles all data storage and data access logic, and one performs the application logic. Client server networks can be cheaper to install and often better balance the network loads but are far more complex and costly to develop manage.…

    • 1140 Words
    • 5 Pages
    Good Essays

Related Topics