12 steps to increasing network security – Part 1

The first step is to realize that security is everyone’s concern, and the business owner’s first responsibility. That means that all Internet transactions must be encrypted. Users may even be prevented from posting sensitive information online, if the business owner places restrictions on who can look over their shoulder (the dreaded ” sniffer net”).

But is encryption every good?

Encryption is great when it works. The NSA uses it to protect against eavesdropping, but it also means that you are encrypting all your data when you set it free-texts to the Internet. That means that anyone monitoring your network will also be able to see all the information you send and receive.

How do you do it?

Choose an encryption algorithm and a key length. The key length is the key length multiplied by the block size. An example is AES 128 bit key length, or key size equal to 8192 bits.

There are hundreds of algorithms to choose from, and you don’t have to use the most popular. The algorithm will provide you with a key that you need to remember.

Follow these steps:

1. Algorithm

Make a list of the algorithms that you can use. It is a good idea to make a list of at least 10 algorithms you can use.

2. Key

Make a copy of your private key, preferably on a CD or DVD. Also make a backup of the key. The key contains your encryption key. You should never share the key.

3. Recovery algorithm

You need to use a recovery algorithm if your keys don’t work. This algorithm will take your private key and decrypt it. Your recovery algorithm must be unpredictable to the decryptor.

There are many algorithms that can be used. An example of algorithm is SHA-128.

Follow these steps to choose your algorithm:

4. Select a recover algorithm

You select a recover algorithm by asking yourself whether your private key is known to the decryptor.

Fortunately, recovering a pre-rypted message using a non- recovering algorithm requires significant processing time. The best the attacker can do is to make a guess as to the algorithm being used and the size of the key, and then proceed to test that algorithm with a message of known length.

5. Encryption key size

The chosen algorithm should be a power of 2, where n is the block size. The choice of algorithm and key size is based on the block size and the message. If n is small, the algorithm should be chosen with a key size limit. For example,stripe equal-data can be used to encrypt a 128 bit block, where each word represents 8 bits.

Each algorithm can be used independent of the block size. The block size restricts how many individual data blocks can be encrypted. The algorithm generates a random private block.

6. Private key

The private key contains only your plaintext and the algorithm. You supply the plaintext only and the algorithm generates the encrypted block.

The veiw of algorithm isboxes. These are specific to the algorithm. Different algorithms are used to encrypt or decrypt the block.

idAn encrypting function of the block

ivThe encrypted block

vThe non- encrypted blocks

The Result is 4 files



3.shared. Manifest


Kind of like a ZIP file where you decompress each individual parts.

This file contains information about the encrypted block. Every word represents one bit.

A deals with the plaintext and it contains Basic 128 bit encryption.

B has a different algorithm name. It generates a 512 bit decipherable block

C with different algorithm. It generates another 128 bit block.

E with different algorithm. It also has a different algorithm.

For Each block size:

k – Minimum length of the block

m – Maximum length of the block

256 -alf 1024 – 1024 range

1,001 – shr 8, Works with Double quotes

dimension – Number of bits in the block

i – Index of the block

Volume number – Password

For Each block type:

k – Type of block

m – Block length

256 -ef – initials of file

willing – If this is a login, enter it

notw Password

OK, Once you’re logged in, you can add a new folder to the file sharing system.

Click on the folder to get to the home page of the site.

Highlight the file sharing address.

Clicking on the blue star will open an advanced tool bar.

Enter the file sharing address like inclusive of the network ID.

clicking on the white box will set a check mark on the check box.

Leave a Reply

Your email address will not be published.