Data transfer security

Basically, based on security techniques, we can reference the security of information into two groups: data confidentiality by means of hardware and software techniques through security algorithms. However, in order to ensure the safety of data on the computer network in order to prevent the possibility of infringements and possible risks or problems in the transmission process, the prevention and accurate identification The risks that can affect data are extremely important. Actually, there are two main forms of harm to data transmission: active and passive. These two directions are:
 Data transfer security
Basically, based on security techniques, we can reference the security of information into two groups: data confidentiality by means of hardware and software techniques through security algorithms. However, in order to ensure the safety of data on the computer network in order to prevent the possibility of infringements and possible risks or problems in the transmission process, the prevention and accurate identification The risks that can affect data are extremely important. Actually, there are two main forms of harm to data transmission: active and passive. These two directions are:

+ Steal information: Listen to the information on the link, know information about the sender and receive information on the information contained in the packet transmitted on the network. This way, the intruder can check the exchange rate, the number of packets transmitted, and the length of the packet. However, with the above action, usually for the purpose of viewing information, copying, stealing information content (such as passwords, banking information ...), but not the harmful effects of the material. Reason for data or falsifying data content.
+ Information sabotage: Changing data content, inserting data information, destroying packets, delaying transmission, copying data repeatedly ... for the purpose of damaging or Falsifying information content.
In order to protect data transmission information, in this article I present two directions for security:
Link-oriented security: Information is encrypted for protection based on the path between two nodes and does not care about the source and destination of the information. Encryption pairs are located at both ends of the transmission line. Therefore, all traffic on all links will be secure.

- End to End Secrity: Encrypt traffic from the source computer to the destination computer. The information is encrypted as soon as it is created at the source and decrypted only to the destination. This method makes user data secure but not immune to case analysis attacks, as in packets only user data is encrypted and packet data (control data) is not.
Thus, for data security systems, especially packets containing important information, such as account information or passwords, the security of information transmitted over the network is extremely important. . Today, the combination of two forms of security to improve the functionality of the system is necessary. Then the terminal computer prepares the user's packet data code using the terminal code. Both packets are encrypted using line coding.
At that time, the modeling approach towards End to End and Link Oriented security. Data at the start of a clear copy (R - unencrypted data). To transmit secure information, the plaintext should be encrypted before transmission. In order for the data code R to need a key - K.
If the K key is sent at the sending address, it must be sent via a secure channel to the receiving address or possibly a third party K-key and securely transferred to both places (sender and receiver). . With the R message and the K code key, the E code algorithm generates the M = EK (R) code. Once the data has been encrypted, before it is transmitted, it is cut out in packets and transmitted in different directions based on the topology of the network and traffic on the network.
In the process of transmitting information, the intruder can listen for information on the link and catch the packets to steal information. Therefore, splitting packets during transmission is also an important step to reduce the risk of data loss and data loss on the network. Packets that are circulated on the network for a period of time will specify the time to live (TTL)

In the process of transmitting information may be the number of packets to the destination is not enough but based on the algorithm we can restore the broken packet and conduct the packet coupling then the decryption task. At the receiver with M code and K key code, algorithm D will generate a clear copy of R = DK (M). If the intruder receives the data in the form of an M code but does not have a K key, then he must attempt to restore R or K key (perhaps the intruder already knows the E code algorithm and decryption algorithm. D). In case he is only interested in the content of the message, he will try to restore R by producing an R 'estimate of R. However, usually an attacker wishes to find out the K key to decrypt. The next message, by generating a K key of K. The security of the secret key cryptography is a measure of the difficulty of finding a clear or lockable message when knowing the ciphertext.
You did not use the site, Click here to remain logged. Timeout: 60 second