Wednesday, June 12, 2019

Nextguard Technologies Research Proposal Example | Topics and Well Written Essays - 2250 words

Nextguard Technologies - Research Proposal ExampleHowever, user credentials are required for liberty and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada and bleak York. As all applications are hosted on the Phoenix site, they should be configured on HTTPS and must use a VPN tunnel for exchanging entropy with the other 4 sites. Moreover, for adding an extra layer of security, MAC referencees should be linked with WAN IP addresses requesting access to one of the hosted applications. Access Control policy should be drafted that will address access to whom and why. A responsible, Accountable, Consulted and Informed (RACI) chart should be developed, as it will define roles and responsibilities for each user permitted to access web based applications.2sea squab Encryption Algorithm for NextGuardAs per computer desktop encyclopedia Blowfish encr yption algorithm is defined as A secret key cryptogram method that uses a variable length key from 32 to 448 bits long. It uses the block think method, which breaks the text into 64-bit blocks before encrypting them. Written by Bruce Schneier, as a forego replacement for DES or IDEA, it is considered very fast and secure and as per network dictionary, it is defined as Blow?sh is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block grave that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable use. Blowfish is an encryption algorithm that was invented by Bruce Schneier in 1993 (Pachghare, 2009). It is constructed on a variable length key ranging from 32 buts to 448 bits that is considered to be perfect for both local and international use along with a solid encryption algorithm. aft(prenominal) its recognition to be relatively solid encryption algorithm, it is gradually gaining acceptance. Some of the core features of blowfish algorithm include (Pachghare, 2009) Blowfish has a block cipher of block consisted of 64 bit The length of the key can be up to 448 bits BladeCenter web interface MM Control, Login Profiles page. (n.d.) On 32 bit microprocessor architecture, data encryption is supported at a rate of 18 clock cycles on every byte that is much quicker than DES and IDEA encryption. It is still rationalize to use and is not patented Memory requirements for blowfish are less than 5 kilobytes of memory The semantics are simplified and is relatively easy to deploy The concept requirements for a blowfish encryption algorithm incorporates robust, simple to code, compact, easily modifiable and flat key space features (Anderson, 1994). Likewise, flat key space facilitates random string to be considered as a possible key from a required length. Moreover, it deploys data in massive byte size blocks and incorporates 32 bits blocks where applicable (Anderson, 1994). Key ranges, as mentioned earlier are from 32 to 448 bits and operations are common that are supported by microprocessors such as XOR, table lookup etc. furthermore, pre-computable sub keys are applicable with variable iterative numbers. These sub keys are massive and must be pre-calculated prior to encryption or decryption process carries out. In an example below, lets assume that P is pre-calculated array consisting of 18, 32 bit sub keys from P1, P2 till P 18. In addition, there are S boxes (32 Bit) indicated by S with entries equal to 256 each (John Rittinghouse & Hancock, 2003). S1, 0, S1, 1S1, 255 S2, 0, S2, 1.S2, 255 S3, 0, S3, 1

No comments:

Post a Comment