Free

Cracking time for different protocols - Essay Example

Comments (0) Cite this document
Summary
Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion. Difference in protocols is evident in their design (Miltchev et al., n.d., p. 2). For…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Cracking time for different protocols
Read TextPreview

Extract of sample "Cracking time for different protocols"

Running Head: CRACKING TIME FOR DIFFERENT PROTOCOLS CRACKING TIME FOR DIFFERENT PROTOCOLS By University name
City, State
Date

Cracking Time for Different Protocols
Different protocols affect the hacking time required to break. Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion. Difference in protocols is evident in their design (Miltchev et al., n.d., p. 2). For example, TCP/IP has weak points that hackers can use to spoof IP addresses and attack TCP link requests within minutes. Another example is widely used security protocols that do not normally entail the provisions for dependable authentication as part of the central protocol. SMTP, POP3, and IMAP4 are mail transfer protocols that enable hackers to forge emails effortlessly (Miltchev et al., n.d., p. 2). This is because these protocols do not need the usage of encoded that could make sure the privacy or discretion of email messages.
Another example of how different protocol designs affect the time needed to hack is intrusion hacking. Intruders use a range of attacking mechanisms to acquire access to networks. These mechanisms consists of password-cracking mechanisms, protocol cracking, and manipulation instruments (Miltchev et al., n.d., p. 7). Detection mechanisms used by intruders help identify alterations and alternatives that occur inside networks faster in TCP/IP than POP3 or SMTP protocols. An IT team called Nohl attempted to crack the OTA protocol in 2011 and realized its design is far more secure than any products by Microsoft or Linux. Hacking the OTA protocol took the team longer to get through by sending commands to a number of SIM cards than cards with other types of security protocols such as Java (Olson, 2013).
Protocol performance affects cracking time by decreasing the number of surged weak points in the respective network. Protocols with significantly better performances have environments with few weak points. In such settings, a well performing protocol dos not timeout frequently (Miltchev et al., n.d., p. 7). For example, a study conducted on protocol HACK found out that it was better than SACK because of SACK’s continuous timeouts. On the other hand, HACK was able to maintain data stream to some degree. This performance was in fact six times better in terms of output than SACK in the existence of surge errors (Balan et al., 2002, p. 359). Another case of the cracking time of protocols depending on the frequency of weak points is 2013’s powerful supercomputer NUDT Tianhe-2 ability to crack a 128-bit AES code. Researchers estimated that the supercomputer would take over 333 million years to crack this key, which is significantly longer for breaking any code (Crawford, 2014).
High security protocols have an effect on performance, time, and mostly costs. This effect occurs because high security protocols identify packet loss because of hacking and recover the required data. The ability to detect these losses is an indication of the protocols’ dominion over performance (Olson, 2013). The flexibility of distinct cryptographic elements enables the usage of different protocols by numerous applications such as file-system encoding and user-level procedures. For instance, high security protocol IPsec takes far less time to achieve secure network communications than other popular security schemes. However, this level of security comes at a cost that produces adequate performance for practicality. For instance, WEP policies cost the least and IPsec policies cause substantial costs but offer stronger performance within a short period (Miltchev et al., n.d., p. 1).
References
Balan, RK, Lee BP, Kumar, KRR, Jacob, L, Seah, WKG, and Ananda, AL 2002, ‘TCP HACK: a mechanism to improve performance over lossy links,’ Computer Networks, vol. 39, pp. 347–361.
Crawford D 2014, PPTP vs L2TP vs OpenVPN vs SSTP vs IKEv2, Best VPN, viewed 21 January 2015, https://www.bestvpn.com/blog/4147/pptp-vs-l2tp-vs-openvpn-vs-sstp-vs-ikev2/
Miltchev, S, Keromytis, AD, and Ioannidis, S n.d., A Study of the Relative Costs of Network Security Protocols, DARPA, pp. 1-8.
Olson P 2013, SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phone, Forbes, viewed 21 January 2015, http://www.forbes.com/sites/parmyolson/2013/07/21/sim-cards-have-finally-been- hacked-and-the-flaw-could-affect-millions-of-phones/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cracking time for different protocols Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Cracking time for different protocols Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols
(Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words)
Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols.
“Cracking Time for Different Protocols Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1674848-cracking-time-for-different-protocols.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cracking time for different protocols

Password Cracking System

...is mathematically altered by the client, using the password and the hash and the subsequently altered value is the returned to the server. This altered value is termed as the 'response'. On the server's end the same calculation is performed and if the resultant matches with the client's response value the authentication is granted. The form of authentication used by Kerberos is entirely different from the challenge-response methodology. The user's password is converted into a secret in Kerberos. This key is used to encrypt a timestamp and this timestamp is then sent to the server. Replay attacks are restricted by Kerberos by generating the time stamp. Win 2000 protocol and later...
25 Pages(6250 words)Research Paper

Security protocols

...work. Moreover, computers with different subnet are supported and thousands of computers can be connected on the domain based environment. For instance, if a computer stops responding, employees or users can log on from some other computer and no work is halted. Therefore, Domain based network environments are more effective and are compatible to the current network scenario. Moreover, if security auditing features are enabled, user activity and system logs are saved and monitored. Likewise, the lightweight directory access protocol ensures encryption all the way from the domain controller to the workstations via Kerberos. However, network or system security specialist will not be able to monitor,...
12 Pages(3000 words)Case Study

Password Cracking Systems

...or possesses a number of confidential data and information (Burr et al., 2006). In this scenario, majority of verification systems are basically dependent on secret passwords. But unluckily, the uncertainty and extent of user selected secret passwords turn out to be permanent even after a long period. In difference, a hardware development continually provides attackers growing computational control. Thus, password methods like that customary UNIX user-authentication structure are becoming unsuccessful with the passage of time (Provos & Mazieres, 2002). Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a...
20 Pages(5000 words)Research Paper

Cracking the Code of Change

...?Cracking the of Change We are living in the time of radical change and turbulence. The labor market, consumers, financial pressure, globalization, new market trends, etc are few reasons for change in the organizations. According to Beer and Nohria (2000), the societal conditions in the modern days are exceptional in terms of change. The traditional industries have already accepted the fact that they either need to change or perish. Managing and understanding change has become a virtual industry nowadays. The consultancy firms, mass media, corporate executives and other eminent personalities are actively taking interest in this virtual industry and developing different theories stating...
6 Pages(1500 words)Essay

Advanced Routing Protocols

...cost of the path to a destination (best path criteria), however, what differs between them is the criteria for choosing the lowest cost path. Distance Vector Routing Protocol: This protocol decides the cost of reaching a destination based on the number of hops to the destination (i.e., the number of IP hosts traversed to reach the destination). The most common Distance Vector Routing Protocols are IP RIP version 2 (this is more popular compared to the original RIP as some limitations have been removed) and Cisco IGRP. The exchange of information in routing tables in RIP/IGRP is carried out by a broadcast sent by all routers to all other routers on the network. Link State...
22 Pages(5500 words)Essay

Technology Evaluation Different Time, Same Place

...Journalism, Mass Media and Communication Technology Evaluation “Different Time, Same Place” Cultural Dimensions As a social media company Twitter allows for collaborating or working together between members of an organization. Both individuals and teams can use real time communication ‘tweets’ as a method of communication within a company. Personal profiles and communities of practice, which are communities of Twitter users grouped by topic are available and can be searched. Twitter does not identify experts in areas though using the search feature you are able to locate any keyword though this does not make them experts in that area. Economic Dimensions Twitter allows you to...
1 Pages(250 words)Essay

Technology Evaluation Different Time, Different Place

...dimension (add up scores):_6____ Divided by 6 = ____1_______average Assessing the Economic Dimension For the technology selected, answer the questions below: Does the technology: Help reduce the amount of time working on tasks? Yes No Do not know Allow you to easily transfer different media types to co-workers? Yes No Do not know Permit accurate auditing for usage and cost? Yes No Do not know Reduce the effort of working together? Yes No Do not know Reduce the time spent searching for information? Yes No Do not know Make completing tasks easier? Yes No Do not know Total score for the Economic Dimension (add up scores):__5___ Divided by 6 = __0.83_________average Assessing the...
1 Pages(250 words)Essay

Hacking and Cracking

...community and computer industry on description of hacker that perform ethical hacking and one gain unauthorized access to person’s system, cracker has been introduced. According to the computer industry, cracking is malicious access of information or destruction of information. A cracker is therefore a person accessing information without authority or without informing the owner with the aim of damaging information or personal gain. The definition above is based on the fact that differences must be made where intrusion meant to correct security vulnerabilities is done and malicious access of personal data without authority. Types of Hackers Based on the study above, it is clear that there are hackers...
4 Pages(1000 words)Essay

Network Protocols

...Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45). There are various types of protocols; in the lowest stage protocols are used to define the type of the...
1 Pages(250 words)Case Study

EDirectory Protocols

...of IP address/ domain name correspondence would be impractical, the list of IP addresses and Domain names are distributed in hierarchy of authority within the internet. There may be existence of a DNS server available in a closer geographical proximity to the access provider which maps the domain names in the user’s internet request or directs them to other servers. Because of the distributed and the open design of DNS, and its utilization of the user Datagram protocol, domain name system is vulnerable to different forms of attacks. Public domain name system is often at risk, since they are unable to restrict incoming packets to a set of IP addresses (Weber, 2007). Service location...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cracking time for different protocols for FREE!

Contact Us