Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Need an research paper on network and internet security. Needs to be 4 pages. Please no plagiarism.

Need an research paper on network and internet security. Needs to be 4 pages. Please no plagiarism. On the other hand, the single key encryption only uses a single secret key for both encryption and decryption of messages. A hybrid of the two that is single key and public key encryption is what the modern encryption model entails to help establish reliable secure sessions. According to De & Yung (2006, 127), session keys help enhance security of a system in cases where two parties have an encrypted connections to third party. By use of these session keys, the third party can deliver keys the other two parties on the encrypted links.

Session keys are established by use of Diffie-Hellman key exchange which enables the secret exchange of keys between two users on a communication channel by the use of exchange algorithms. This way of key generation does not required the presence of a central authentication server or any key distribution center. These two users maintain a secured encrypted message through a partial share of information. Some data is privately stored while some is publicly given for the other party to use. Using exchange algorithms, the two parties can use the publicly aired data to encrypt hidden messages from senders on a crowded communication channel (De & Yung 2006, 127). User 1 computes the key using the public data given by user 2 and viceviser. Both calculations will eventually yield similar results indicating a common interpretation.

Kerberos V4 uses session keys to help maintain a secured communication protocol (Bao, Deng & Zhou 2004, 30). Kerberos v4 are useful in verifying users at work places who would wish to access services within a network. Session keys use in Kerberos would restrict access only to identified and authorized users and would accurately authenticate requests for uses. These authentication procedures make the use of session keys become very relevant in Kerberos.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question