INS - Assignment 3 (TCS2223033)
INS - Assignment 3 (TCS2223033)
INS - Assignment 3 (TCS2223033)
Roll-No: TCS2223033
INS Assignment 3:
1. Public Announcement:
Here the public key is broadcasted to everyone. The major
weakness of this method is a forgery. Anyone can create a key
claiming to be someone else and broadcast it. Until forgery is
discovered can masquerade as claimed user.
4. Public Certification:
This time authority provides a certificate (which binds an
identity to the public key) to allow key exchange without real-
time access to the public authority each time. The certificate is
accompanied by some other info such as period of validity,
rights of use, etc. All of this content is signed by the private key
of the certificate authority and it can be verified by anyone
possessing the authority’s public key.
First sender and receiver both request CA for a certificate which
contains a public key and other information and then they can
exchange these certificates and can start communication.
2. Signing Algorithms:
To create a digital signature, signing algorithms like email
programs create a one-way hash of the electronic data which is to
be signed. The signing algorithm then encrypts the hash value
using the private key (signature key). This encrypted hash along
with other information like the hashing algorithm is the digital
signature. This digital signature is appended with the data and
sent to the verifier. The reason for encrypting the hash instead of
the entire message or document is that a hash function converts
any arbitrary input into a much shorter fixed-length value. This
saves time as now instead of signing a long message a shorter
hash value has to be signed and moreover hashing is much faster
than signing.
Uses of IP Security –
IPsec can be used to do the following things:
To encrypt application layer data.
To provide security for routers sending routing data across the
public internet.
To provide authentication without encryption, like to authenticate
that the data originates from a known sender.
To protect network data by setting up circuits using IPsec
tunneling in which all data is being sent between the two
endpoints is encrypted, as with a Virtual Private Network (VPN)
connection.