Applications and the use of cryptography

Cryptographic systems are the common implementations of standard algorithms. They may be used in applications and embedded systems.

The following are some systems that are popular:

  • Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are protocols that provide communication security by encrypting sessions while using the Internet. They use many of the cryptographic algorithms discussed previously. Some of the activities that can be secured by TLS or SSL are web browsing, e-commerce transactions such as online shopping, banking, and more, and instant messaging or Internet chat.
  • Secure Electronic Transaction (SET) is a set of standard protocols for securing credit card transactions over insecure networks. SET uses digital certificates and public key cryptography. One of the primary applications is to ensure security while using credit cards over the Internet.
  • IPSec is a set of protocols to secure Internet communication. Authentication and encryption are the key functions. IPSec is primarily used in the implementation of Virtual Private Networks (VPN).
  • Pretty Good Privacy (PGP) was developed by Zimmermann, is a software package that supports secure e-mail communications. Some of the security services provided by PGP include message encryption, digital signatures, data compression, and e-mail compatibility. PGP uses International Data Encryption Algorithm (IDEA) for encrypting the message and it uses RSA for key exchange and digital signature.
  • Secure Multi-Purpose Internet Mail Extensions (S/MIME) uses public key cryptography to provide authentication for e-mail messages through digital signatures. This system uses encryption for the confidentiality of e-mail messages. This standard defines how both parts of e-mail (header and body) can be constructed. This standard is also called an extended Internet e-mail standard, as it defines the usage of multimedia content, such as picture, sound, video, and so on, in e-mail messages. MIME itself does not provide security. S/MIME is an encryption protocol and provides digital signature capabilities to e-mail messages. S here denotes secure.
  • Secure Hypertext Transfer Protocol (SHTTP) is a protocol that introduces an authentication/encryption layer between the Hyper Text Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) so as to secure the communications for the World Wide Web (WWW).
  • Secure Shell (SSH) is a protocol that establishes a secure channel between two computers for communication purposes.
  • Kerberos is an encryption and authentication service. Kerberos is designed to authenticate network resources and it does not provide any third-party verification (as opposed to digital signatures). Kerberos maintains a centralized server that performs the functions of key distribution and session authentication between two network resources. A single point of compromise would be the Kerberos server itself.
  • Steganography refers to the art of concealing information within computer files, such as documents, images, or any multimedia content. This is opposed to obscuring information by encryption. Only the sender and receiver can know the presence of the hidden message.
  • Digital Watermarking is a method by which copyright information is embedded in digital content, such as documents, images, and multimedia files.
  • SecureID is a two-factor authentication system developed by Security Dynamics. This uses a randomly generated number along with a PIN or password for authentication purposes. This is used in local as well as remote access computers.
  • Wireless Application Protocol (WAP) is a set of standards for wireless communications using devices such as mobile phones. The encryption technology is used in Wireless Transport Layer Security (WTLS).
  • IEEE 802.11 is a set of standards for Wireless Local Area Networking (WLAN). Wired Equivalent Privacy (WEP) and Wireless (WI-FI) Protected Access (WPA) are the commonly used protocols for encryption in this communication standard.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.15.65.65