Friday, December 6, 2019

Network Security RSA Cipher Demonstration

Question: Discuss about theNetwork SecurityforRSA Cipher Demonstration. Answer: Introduction: The following research report showcases the process of providing internet security implementation using RSA Cipher Algorithm. It is enriched with overview, demonstration, summary and conclusion. Overview: According to Kahate (2013), internet can be refereed as network of different networks. Each computer of this network is identified as a unique entity by its IP address. It is provided by special server system called DNS (Domain Name Server). Interconnected computer uses the IP to exchange message data among themselves. Providing network security, we refer to provide security to the messages that get exchanged between the networks for communication. Demonstration: Running a RSA Cipher Demonstration RSA is basically an algorithm which provides security to different message transmission, inter network connection authentication, and establish trust connections between two entities (Ciampa 2012). The name RSA stands after the three inventors Rivest, Shamir and Adleman. It is the first public key algorithm developed to provide network security. RSA Algorithm Work Process RSA cipher algorithm is developed on symmetric public key encryption mechanism. In symmetric public key encryption process, the sender sends message to the information channel by encrypting the text with the public key. After encryption the message is no longer can be retrieved other than decrypting it with the same public key used for encryption (Pierso and DeHaan 2015). Figure 1: Symmetric Key encryption/decryption model Source: (As created by author) After encryption is complete the message is sent to the internet channel for transmission. There can be many attacks possible in the internet channel such as man in the middle attack, message interception by any third party untrusted sources etc. If the message was not encrypted, there was very high possibility that the attacker can get the message and modify it. On the other hand, as the message is now encrypted using cipher key, it is very tough for the attacker to decrypt the message without knowing the encryption key. This is how RSA authentication avoids different man in the middle attacks and restores authenticity of the data (Knapp and Langill 2014). The encrypted data then travels through the internet channel to its destination. After reaching the destination, several validations are done before the decryption process. Following are the basic checks that take place before decryption process, Timestamp Validation Every RSA token (cipher key) is valid for 60 seconds. The timestamp of the RSA request message cannot be more than 60 seconds old. Source Validation The requested source system is also validated to establish a trust connection. Message Content Type Validation Content and the format of the request also need to be of specific format for authentication. After the above steps are cleared decryption process starts in the recipient end. RSA algorithm follows the symmetric public key encryption/decryption method. The decryption key is also available in the recipient end (same as the encryption key valid for 60 seconds). Once the decryption is completed, the original message can be retrieved. Authenticity of the retrieved message is performed in the recipient end. Figure2: RSA Public key encryption/decryption model Source: (As created by author) Summary and Conclusion: Form the above analysis, it can be inferred the following points RSA algorithm is the first symmetric public key algorithm introduced to validate authenticity of the message. It is written in JavaScript language. The cipher key is unique secure key known as RSA token. Authenticity in both sender and recipient is done based on encryption/decryption process using the RSA token. Reference List: Ciampa, M., 2012.Security+ guide to network security fundamentals. Cengage Learning. Kahate, A. 2013. Cryptography and network security. Tata McGraw-Hill Education. Knapp, E.D. and Langill, J.T., 2014.Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Pierson, G. and DeHaan, J., Iovation, Inc., 2015.Network security and fraud detection system and method. U.S. Patent 9,203,837.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.