Wednesday, May 6, 2020
Data Encryption Standards Options for WiMax Networks
Question: Describe about the Data Encryption Standards Options for WiMax Networks. Answer: Data Encryption Standards options for WiMax Networks There are a many data encryption standards available today to be used and which can be applied for the WiMax Networks use. DES, as it is popularly known, is the first data encryption standard to be developed. This standard was mainly based on the algorithm known as Lucifer algorithm. Now, as it was one of the earliest data encryption standards to be developed, there were also a number of mechanisms developed for overcome this and to break in to overcome the security and break into the systems, developed with these encryption standards Next data encryption standard to be developed is 3DES i.e. triple DES. This data encryption standard uses the similar encryption technique that was used to develop DES. It, however, offers various additional advances on security fronts as here encryption standard is applied and used thrice over the network. This makes it difficult for the intruders or the attackers to overcome the security and break into the systems Advances Encryption standard is the third data encryption standard that was developed. It brings several advanced security features with us as compared to DES. It offers improved data security and better encryption to ensure that so that the security and privacy of the network along with the information to be exchanged through these are maintained completely. Brute Force attack is the only attack which could possibly bypass its security standards. Although there are very high number of probable combinations of letter and digits needed to try to bypass the security virtually, makes it virtually impossible for the attackers to be successful here as well (Doe, 2016). Compare and Contrast Factor AES 3DES DES Developed This standard was introduced and developed in the year of2000 This standard was introduced and developed in the year of1978 This standard was introduced and developed in the year of1977 Cipher Type In this standard, Symmetric block cipher is used for data encryption In this standard, Symmetric block cipher is used for data encryption In this standard, Symmetric block cipher is used for data encryption Key Length There are three varying options for key length in this standard. These can be 256, 192 or 128 bits There are three keys involved in this standard - K1, K2 K3. All are of 168 bits. and K2 has same length of 112 bits The key length in standard is one only which is fixed at 56 bits Level of Security Very secure and safe Moderate security capability. Security level here is less then AES but more than DES. Security is inadequate due presence of many security loopholes Block Size The block size here has three options of 128 or 192 or 256 bits The block size here is fixed at 64 bits The block size here is fixed at 64 bits Possible Keys In this case of standard, it can have a maximum of 2128, 2192 or 2256 keys depending upon the key length which is selected In this case of standard, it can have a maximum of 2128, 2192 or 2256 keys depending upon the key length which is selected In this case of standard, there can be a maximum of 256 keys Time required to check all the possible keys With a speed of 50 billion keys per second, all possible keys of 128 bit length will take approximately 5x1021 years to be checked With a speed of 50 billion keys per second, all possible keys of 128 bit length will take approximately 800 days to be checked With a speed of 50 billion keys per second, all possible keys of 128 bit length will take approximately 400 days to be checked Cryptanalysis Resistance Its secure and against the linear cryptanalysis as well as differential cryptanalysis It is not safe against the differential cryptanalysis It is vulnerable to the linear cryptanalysis as well as to differential cryptanalysis Probable security Challenges for WPAN Technologies Wi-Fi and Bluetooth are the two widely used and popular WPAN technologies. These face a lot many security challenges and concerns everyday with advancement in this field, especially due to the advanced methods and technologies used by the hackers. Following are the two main challenges which are widespread and are common to both of these technologies: DoS i.e. denial of service attack- It is one of the most common type of which is faced by both Wi-Fi and Bluetooth. This attack affects the information availability or denial of access to the users when they seek it. Here WPAN is flooded by a lot of redundant traffic so that it ultimately leads to the service unavailability. Bluetooth connections helps share the bandwidth of internet or the other connections with a many other connections like mobile phones, various computers etc. This, in turns makes it exposed to interference. The attackers causes signal jam by using this loophole. Bluestab, Bluejacking and Bluesmack are popular examples of the DoS attacks for WPAN technologies involving Bluetooth (Ryke Al-kfairy, 2016). Impersonation attacks- These are the 2nd type of the attacks which are most common in Wi-Fi and Bluetooth WPAN technologies. Under these kinds of attacks and security attack, the attackers impersonate themselves as an authenticated user and obtain the users or systems trust at the opposite end. It results in the gaining the valuable information which might be important and confidential to the company, individuals or system through unauthorized means. Attackers gain the access to the private or confidential information through these attacks and impact the integrity of the data. They impersonator succeeds in gaining the access to the system. They may also play with the other users privilege like modify or delete these access options. They may also connect the system to unsafe connection through the network. Attackers may even place requests to the administrator or to other users without the device owners knowledge. These types of attacks are more frequent in case of Wi-Fi connections, compared to the connections which are over Bluetooth. The compromise on the security or the threats involved, however, is the similar in both cases. References Alanazi, H. (2010). New Comparative Study Between DES, 3DES and AES within Nine Factors. Retrieved 21 September 2016, from https://arxiv.org/ftp/arxiv/papers/1003/1003.4085.pdf Aleisa, N. (2016). A Comparison of the 3DES and AES Encryption Standards. Retrieved 21 September 2016, from https://www.sersc.org/journals/IJSIA/vol9_no7_2015/21.pdf Al-kfairy, M. Ryke, S. (2016). Bluetooth Security. Retrieved 21 September 2016, from https://www.ida.liu.se/~TDDD17/oldprojects/2008/projects/10.pdf Doe, P. (2016). Comparison between DES, 3DES, AES and Blowfish (Data Encryption Algorithms). Bright Hub. Retrieved 21 September 2016, from https://www.brighthub.com/computing/smb-security/articles/75099.aspx Rajamohan, P. (2016). Analysis and Issues of Wireless Protocols Standard Suits in WPAN. Retrieved 21 September 2016, from https://www.ijcnwc.org/papers/vol4no42014/2vol4no4.pdf Wmich,. (2016). Wireless Personal Area Networks (WPANs). Retrieved 21 September 2016, from https://cs.wmich.edu/~alfuqaha/Fall09/cs6030/lectures/WPAN.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.