Services

 

Web Stuff

Networking

Custom PC's

Modification

Upgrades

Onsite Diagnostics

Back Up/Storage

Sponsor & Affiliates Info

 

 

Extras

Past Sponsors

Affiliates

Reviews

Articles

Guides

Affiliate News

 

 

 

 

Local Gamming 

LAN Party Sites

reLANtless.net

RITFest.net

 

 

 

 

This article is another informative type. All of the information is from a networking class this is based on a project. My hopes is for our community to get a slightly better grasp on why what and how Encryption works.. Feel free to send me an e-mail with any question or comments.  Hope you guys enjoy the info..

 

What Is Encryption

 

09/25/05

 

 

     Encrytion is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption is used in secure Web sites as well as other mediums of data transfer. If a third party were to intercept the information you sent via an encrypted connection, they would not be able to read it. So if you are sending a message over the office network to your co-worker about how much you hate your job, your boss, and the whole dang company, it would be a good idea to make sure that you send it over an encrypted line. 

 

 

"Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.

While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers.

Cryptology embraces both cryptography and cryptanalysis." (Taken From http://www.pgpi.org/doc/pgpintro/ )

 

 

 

 

 

Why do we need Encryption

 

 

      Record Integrity

    Insure data was unaltered during transmission

      Authentication

    Assure the Identity of the recipient

      Confidentiality

    Privacy of a persons data

 

Types of Encryption

      Secret Key Symmetric

     Simple mentality both users have passwords to lock and unlock the data

      Public Key

     Two key involved generally used in the internet

 

      One Way Function

     This uses a certification or digital signature to verify recipients identity.

 

 

Secret Key Encryption

      Symmetric key same password to encrypt and decrypt

 

      Requires an algorithm and a key

 

      Algorithm is not necessarily complex

 

      Short coming password exchange

 

      General application password protection on devices such as routers and hard drives.

 

 

 

One-way Encryption

      Password file may be stolen defeating the basses for the security system. Thus one-way or password file encryption is used.

 

      One-way allows the user login to be encrypted and stored using the same encryption.

 

      It is impossible to reverse the encryption preventing login id theft.

 

      This also can be used for creating digital signatures.

 

 

Public Key Encryption

      Source for the public key has an unlock for data sent from senders to the source. No one else can see the decrypted information.

 

      Generally used in Banking or Internet transactions.

Associated Encryption Acronyms

Wired Encryption Standards

DES vs. AES Key sizes

Wireless Encryption Standards

Other types of Encryption/Security available

iNET 900 Radio

 

Public VS. Private Key Encryption.. 

( Image Taken From http://www.pgpi.org/doc/pgpintro/ )

 


Secure Networking Environment

       iNET is NOT interoperable with 802.11 standard products

     Operates in 900 MHz band.  Not 2.4 GHz

       Proprietary frequency hopping spread spectrum

     Network address required to synchronize to hop pattern

       15 character alpha-numeric network address

     Set when radio configured and never transmitted over the air

     Determines unique pseudo random hop pattern

       Protection from unauthorized access

     Authentication and authorization denies access to  unauthorized radio

     Authorized remote access lists in AP by MAC address

       Protection from rogue Access Point

Authorized AP access Lists in remotes by MAC address

For more information on Encryption Check this guys site out its pretty extensive. CLICK.. Keep in mind this article is design for a high level fundamentally point of view for specifics the link will do nicely....

Gazillion Songs on your MP3 Player

 

 

 

Marns CDA

By

pr101j

 

Good Links

Other Good Links

Comp Tech Tutorial

Blue Drake

Sound Wave

 

Mod Sites & Guides

TwistedMods.com

PimpRig.com

Virtual-Hideout.net

Hitechmods.com

PCclub.com

MADSHRIMP

 

Affiliates

Want to Be an Affiliate? Click

 

 

 

 

 

 

Google

 Copyright 2004  Marns CDA
All other trademarks and copyrights on this site are owned by their respective owners. All Rights Reserved. Reproduction by permission only. General disclaimer: This website displays the personal opinions of authors and other contributors. Marns CDA assumes absolutely no liability for these opinions nor for any damages that may result from reading and/or implementing any material found on this website.

 

 

Manufacturers

 

ATake

ABIT

Albatron

ALPHA

AMD

Antec

Arctic Cooling

ASUS

ATI

CaseArts

CoolMax

CORSAIR

NVidia

MonsterGecko

OCZ

PowerColor

ProLink

Scythe

Soyo USA

Spire

Titan

ThermalRight

ThermalTake

V-Tech

Xtreme Gamer