Friday, December 6, 2019

Cryptographic Techniques for VPN and Security-myassignmenthelp

Question: Discuss about theCryptographic Techniques for VPN and Security. Answer: Cryptography is a very important technology in the area of VPN and cyber security through encryption. The cryptography is used to provide data confidentiality by two cryptographic techniques termed as symmetric cryptography and asymmetric cryptography. The symmetric cryptography has a structure where the sender and receiver of data share a common key which is actually protected information to encrypt and decrypt data. The communication between two users can happen when the key is agreed. There are various types of symmetric cryptographic techniques such as stream ciphers, block ciphers, ECB mode, CBC mode. Stream ciphers are algorithms which operate bit by bit at a time. A series of normal text flows into the cipher and as output we get a stream of ciphertext(Mitali Sharma, 2014). The size of text in the steam cipher technique remains same in output. Block ciphers work with blocks of data and the size of the blocks of data changes in compilation with the algorithms(Tripathi Agrawal, 2014). 64 bit is the most popular type in this case. The ECB method identical blocks of ciphertext is obtained by using identical block of plain text. In CBC mode of symmetric encryption a feedback mechanism is used to return the result of the former block are fed back to current block of data. Asymmetric ciphers do not use any key over an unsecure medium. Two keys are generated here and any user who needs to communicate requires to encrypt by using the receivers key. Key exchange is also an useful and feasible type of cryptography technique used in case of large quantity data and it is also faster than the rest two cryptography techniques. Reference Mitali, V. K., Sharma, A. (2014). A survey on various cryptography techniques.International Journal of Emerging Trends Technology in Computer Science (IJETTCS),3(4), 307-312. Tripathi, R., Agrawal, S. (2014). Comparative study of symmetric and asymmetric cryptography techniques.International Journal of Advance Foundation and Research in Computer (IJAFRC),1(6), 68-76.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.