Saturday, April 27, 2019
Nextguard Technologies Research Proposal Example | Topics and Well Written Essays - 2250 words
Nextguard Technologies - Research Proposal ExampleHowever, user credentials are unavoidable for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a realm server must be placed in Georgia, India, California, Canada and New York. As all applications are hosted on the Phoenix site, they should be configured on HTTPS and must use a VPN tunnel for exchanging data with the former(a) 4 sites. Moreover, for adding an extra layer of security, MAC addresses should be linked with WAN IP addresses requesting access to one(a) of the hosted applications. Access Control policy should be drafted that will address access to whom and why. A responsible, Accountable, Consulted and Informed (RACI) graph should be developed, as it will define roles and responsibilities for each(prenominal) user permitted to access web based applications.2 pufferfish Encryption Algorithm for NextGuardAs per computer desktop ency clopedia Blowfish encoding algorithm is defined as A secret find cryptography method that uses a variable aloofness key from 32 to 448 hours long. It uses the thrust cipher method, which breaks the text into 64-bit blocks before encrypting them. Written by Bruce Schneier, as a free submarine sandwichstitution for DES or IDEA, it is considered very fast and secure and as per network dictionary, it is defined as Blow?sh is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that uses a variable- space key, from 32 bits to 448 bits, making it useful for both domestic and exportable use. Blowfish is an encryption algorithm that was invented by Bruce Schneier in 1993 (Pachghare, 2009). It is constructed on a variable length key ranging from 32 buts to 448 bits that is considered to be perfect for both local and international use along with a solid encryption algorithm. After i ts recognition to be relatively solid encryption algorithm, it is gradually gaining acceptance. Some of the core features of globefish algorithm include (Pachghare, 2009) Blowfish has a block cipher of block consisted of 64 bit The length of the key can be up to 448 bits BladeCenter web interface MM Control, Login Profiles page. (n.d.) On 32 bit micro surgical processor architecture, data encryption is supported at a rate of 18 clock cycles on all byte that is much quicker than DES and IDEA encryption. It is still free to use and is not patented holding requirements for blowfish are less than 5 kilobytes of memory The semantics are simplified and is relatively easy to deploy The design requirements for a blowfish encryption algorithm incorporates robust, simple to code, compact, easily modifiable and flat key space features (Anderson, 1994). Likewise, flat key space facilitates random strings to be considered as a possible key from a required length. Moreover, it deploys data in massive byte size blocks and incorporates 32 bits blocks where applicable (Anderson, 1994). line ranges, as mentioned earlier are from 32 to 448 bits and operations are common that are supported by microprocessors such as XOR, table lookup etc. furthermore, pre-computable sub keys are applicable with variable iterative aspect numbers. These sub keys are massive and must be pre-calculated prior to encryption or decryption process carries out. In an example below, lets assume that P is pre-calculated array consisting of 18, 32 bit sub keys from P1, P2 till P 18. In addition, there are S boxes (32 Bit) indicated by S with entries equal to 256 each (John Rittinghouse & Hancock, 2003). S1, 0, S1, 1S1, 255 S2, 0, S2, 1.S2, 255 S3, 0, S3, 1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.