Network security is more than encryption
Much data transmitted over networks is sent in clear text, making it easy for unwanted persons to capture and read sensitive information. Encryption plays a vital role in securing these data by translating them into a secret code. It protects data from intruders and ensures only the intended recipient can decode and read information, by accessing a secret key or password that enables decryption.
Much data transmitted over networks is sent in clear text, making it easy for unwanted persons to capture and read sensitive information. Encryption plays a vital role in securing these data by translating them into a secret code. It protects data from intruders and ensures only the intended recipient can decode and read information, by accessing a secret key or password that enables decryption. Larger keys (more bits) create more potential combinations, making it harder to break the code and unscramble contents in the file.
Even so, networks are no longer isolated from outside intrusion and threats. Encryption protects data in storage and in transit, but cannot validate and separate authorized users from potentially malicious ones. Authentication verifies a user’s identity and is often the first line of defense against an attack.
SSL (Secure Socket Layer) and SSH (Secure Shell) are two protocols for secure Internet communications and authentication. They have become extremely important to overall network security by maintaining strict authentication for protection against intruders, as well as symmetric encryption to protect transmission of data. SSL provides encryption services between a Web server and browser using public-key cryptography. SSL’s ease-of-use and implementation make it popular among designers.
Using authentication in conjunction with encryption can provide a high level of security against low-level attacks. As networking technologies advance, so do the attacks. Encryption algorithms, authentication, SSL, and SSH can protect data and bolster security. Most importantly, a design philosophy with security as a primary element will enable systems to be more robust, ensure greater reliability, and provide new design opportunities.
Common encryption types
Many algorithms are used for encryption, including:
Data Encryption Standard (DES), which uses a 56-bit key to encrypt data. DES is now considered to be insecure for many applications; DES keys, considered small, have been broken in less than 24 hours.
Triple-DES, which uses three successive DES operations to provide stronger encryption than DES. The algorithm is believed to be practically secure, although it is theoretically susceptible to some attacks. In recent years, Triple-DES has been superseded by the Advanced Encryption Standard.
Advanced Encryption Standard (AES), also known as Rijndael, which can use 128-, 192-, or 256-bit keys to encrypt and decrypt data in blocks of 128 bits. As of 2004, there have been no successful attacks against AES.
Two Fish, which was one of the five AES finalists. TwoFish is unpatented, the source code is not copyrighted, and it is license-free for all users.