Crytographic Tunneling

In: Computers and Technology

Submitted By FredaLJW
Words 1193
Pages 5
What is Cryptographic tunneling? Cryptographic tunneling is a method in which information is transmitted from one network to another in a secured manner. Before information passes through the tunnel, it is broken into smaller frames. Each frame is encrypted with an added layer of security and encapsulation. The encapsulation is reverted at the destination with decryption of information, which is then sent to the desired destination (Tunneling, 2011).
The Opened Systems Interconnect (OSI) Model is a great example of tunneling. The OSI model is divided into seven layers and each layer provides a different task. The below chart is the OSI model (Petri, 2009). In the above chart data is transmitted and received. The user creates the data and now the user wants to send the data to another user or the desired destination. The data has to go through fourteen steps in order to reach its destination. The first seven steps in for the transmission of the data and the next seven steps is for the receipt of the data. The steps below will show the process that the data has to go through in order to send the data as well as receiving the data at it final destination.
Data is created and then sent to the application layer (Layer 7). The application layer is where different communication services and applications are provided. The data being transmitted can be transferred by file transfer, electronic messaging, virtual terminal access or any other forms of communications (Merkow, 2005). Before the data leave the application layer, additional encryption and encapsulation is added to the data to give the data more security.
Next step for the data is the presentation layer (Layer 6). In this layer, delivery and formatting of data takes place. The presentation layer processes the data from the application layer so that no issue arises during the sending process.…...

Similar Documents

Networking and the Internet

...function of a firewall. (Minimum word count: 70) Firewalls are programs that filter the content coming into the network. Firewalls protect a network from malicious activity including hackers that try to invade a system. If the firewall flags content that comes through the network, it will not be allowed in. Firewalls can be set up between internal networks, external networks, the Internet, etc. Businesses use various methods to control the information including packet filtering, proxy service, or stateful inspection. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The first tunneling protocol is Point-to-Point Tunneling Protocol (PPTP). This type of protocol allows a business to range their own network throughout private tunnels on the Internet. The second protocol is Layer 2 Tunneling Protocol (L2TP). This type of protocol supports VPN’s over the Internet, but does not provide encryption. The third type of tunneling protocol is IP Security (IPsec) that provides both encryption and authentication over the Internet. 4. Describe a differential backup. (Minimum word count: 35) Differential backup stores the information since the network has performed the last back up for data. This can save storage space on the network and less labor time for the server. Differential backup is faster than a full backup, but they are used together to store data. 5. What is authentication? (Minimum word count: 50) Authentication recognizes......

Words: 350 - Pages: 2


...Cryptographic Tunneling and OSI Model Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized users. (Summer, 2004) With the explosion of the World Wide Web and the need to connect various secure private networks to it, it is vital to protect private data from exploitation when it reaches the public networks for transmission. At the heart of the networks through which the information flows is the Open Systems Interconnection (OSI) model. Various techniques are used with respect to the OSI model that helps the data to be transmitted more securely during network transmissions. One of these techniques is Cryptographic tunneling. Cryptographic tunneling operates at the transport layer and network layer of the OSI model. Cryptographic tunneling is primarily used in VPNs or the Virtual Private Networks to add additional security to the data that is flowing through these networks.  A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. (Mason, 2002) The sender’s authentication, confidentiality of data and hiding the contents of the message is made possible using cryptographic tunneling. When we need data from private businesses to be transmitted through public networks, we make use of tunneling where the public network routing nodes are unaware of the transmission being part of private network. Hiding the packets to make them seem as if they were just like...

Words: 669 - Pages: 3

Vpn for Information Technology

...How Virtual Private Networks Work Document ID: 14106 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information What Makes a VPN? Analogy: Each LAN Is an IsLANd VPN Technologies VPN Products Related Information Introduction This document covers the fundamentals of VPNs, such as basic VPN components, technologies, tunneling, and VPN security. Prerequisites Requirements There are no specific requirements for this document. Components Used This document is not restricted to specific software and hardware versions. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Background Information The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country, or even around the world. But there is one thing that all companies need: a way to maintain fast, secure, and reliable communications wherever their offices are located. Until recently, reliable communication has meant the use of leased lines to maintain a wide−area network (WAN). Leased lines, ranging from Integrated Services Digital Network (ISDN, which runs at 144 Kbps) to Optical Carrier−3 (OC3, which runs at 155 Mbps) fiber, provide a company with a way to expand their private network beyond their immediate geographic area. A WAN......

Words: 3446 - Pages: 14


...ip IPv4 and IPv6 coexistence (tunneling) protocols Introduction The internet is exponentially growing in size, The number of users of the networks seem to be exploding soon, as nowadays many devices exists that connects through the internet using IPv4 protocol and the amount of those devices has increased in the last few years since not only personal computers and laptops are connected to the network but also devices like smart phones, automobiles with GPS, PDA's, and video game consoles. IPv4 is in trouble since it has no capacity to support all those devices to overcome those situation another methods were developed to extend the life of IPv4 such as : Network Address Translation (NAT), classless inter-domain routing (CIDR), and Length Subnet Mask (VLSM). However, this has not been enough because new technology and devices had emerged, making IPv4 unable to support the technological growth anymore. On February 3, 2011 the Latin American and Caribbean internet Addresses Registry (LACNIC) issued a statement that says that the global IPv4 central address pool which is managed by the Internet Assigned Numbers Authority (IANA) was finally exhausted, according to the global policies agreed by the Internet communities of all regions, on that date the last available IPv4 address blocks were allocated, June 6, 2012 was the selected date by the Internet Society (ISOC) and other organizations in the field as the worldwide launch of IPv6. On that date numerous......

Words: 2121 - Pages: 9

Ip Version 6 Addressing Architecture

...IP version 6 As you study this section, answer the following questions: * What is the primary reason for developing IPv6? * How many hexadecimal numbers are in an IPv6 address? How does this compare to a MAC address? * What do you add to an IPv6 address when you remove one or more quartets with all 0's? * What information is included within the IPv6 address prefix? * How many numbers are used for the interface ID? How can the interface ID be related to the MAC address? * What is the difference between ISATAP and 6-to-4 tunneling? * What is the difference between tunneling and NAT-PT? This section covers the following exam objectives: * 1.3 Identify the following address formats * IPv6 IPv6 Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. The IPv6 address is a 128-bit binary number. A sample IPv6 IP address looks like: 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973. The following list describes the features of an IPv6 address: * The address is made up of 32 hexadecimal numbers, organized into 8 quartets. * The quartets are separated by colons. * Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16-bits of data (FFFF = 1111 1111 1111 1111). * Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented by 284.......

Words: 979 - Pages: 4

Unit 8 Nt 2580

...allowing the VPN connection to be shared among many users on different computers. Site-to-Site VPN Connection A site-to-site VPN connection connects two separate private networks. Forefront TMG provides a connection to the network to which the Forefront TMG is attached. Site-to-site VPN connections are discussed in this document. There are three VPN protocols for site-to-site connections: * PPTP  * L2TP over IPsec * IPsec tunnel mode PPTP Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP-based data networks. PPTP supports on-demand, multiple protocol, virtual private networking over public networks, such as the Internet. PPTP allows IP traffic to be encrypted and then encapsulated in an IP header to be sent across a corporate IP network or a public IP network, such as the Internet. L2TP over IPsec Layer Two Tunneling Protocol (L2TP) is an industry standard tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. L2TP allows IP traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery, such as IP. The Microsoft implementation of the L2TP protocol uses Internet Protocol security (IPsec) encryption to protect the data stream from one VPN server to the other VPN server. IPsec tunnel mode allows IP packets to be......

Words: 890 - Pages: 4

Tunneling Critique Essay

...openings for egress, commonly at each end. Tunneling job is addictive. For those who been working underground, closer to mother nature of the earth would not want to be seated in an air conditioned environment. The tittle is Thrill of the drill by the Allon Koay. He is a journalist at The Star Publications, The article is from The Star newspaper on 4th july 2011. The article is to enrich the knowledge about tunneling and together along of the MMC-Gamuda tunneling team’s achievement. Tunneling is one thing for which we can proudly say, we have among the best and the brightest that are fully home grown which is none other than the M’sia MMC Gamuda. Changes are also made to the TBM machine that has been bought from Germany to suit the country’s soil condition. The author is happy about M’sian team of having expertise is such field. Building the largest or tallest or the most advanced is only a part whereby the tunneling part is proudly taken over by expertise in Malaysia with of course the help of foreign talent too. The author is in two state of neither supporting the article content. He tells that foreign talent are equally important too in achieving success. After going through 10 years of tunneling experience, the team had learnt the curves thus the people in work knows the right method to use on right conditions. The author even though is neither in supporting state, its still clear that he indirectly supported the content. The tunneling is an addictive job experience......

Words: 648 - Pages: 3


...the content. 2. Describe the function of a firewall. (Minimum word count: 70) The function of a firewall is to control the flow of information between the internet and private networks. The function of a firewall within a network is similar to a barrier door or gate. It serves as the first line of defense and assists in preventing network attacks. Another way to think of a firewall would be a security guard or metal detector. As information is passed to and from different networks, the firewall is inspecting and looking out for suspicious content. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The four most commonly used tunneling types for VPN’s are L2TP, IPSec, PPTP, and SSL. L2TP is layer to tunneling protocol and does not provide encryption, IPSec is another an encryption and authentication method that is very time consuming and expensive. PPTP is point to point tunneling and the most supported by VPN. And SSL is secure socket layering and does require software installation. 4. Describe a differential backup. (Minimum word count: 35) A differential backup is a type of backup that stores and preserves data that has been added or new since that last full backup was performed. It takes the difference from the full back up and add it to its database. 5. What is authentication? (Minimum word count: 50) Authentication is the process of verifying information or identity to confirm and associate users who log onto a system.......

Words: 386 - Pages: 2

Mr Bai

...Gate Effect on Nanowire Tunneling Field Effect Transistor (FET) Bai Ke, Department of Electrical & Computer Engineering, National University of Singapore Abstract—The simulation study on Si Nanowire Tunneling Field-Effect Transistor (TFET) has been conducted in this project. A device performance comparison was carried out between Double Gate (DG) Tunneling Field-Effect Transistor and Gate All Around Si Nanowire (GAA SiNW) Tunneling Field-Effect Transistor. The device physics and electrical characteristics of the GAA SiNW TFET are investigated for better performance of gate control and low power consumption for the future scaling applications. Due to the high electric filed generated under the gate bias GAA SiNW TFET has high Ion and steep subthreshold swing. It is shown for the first time that subthreshold swing S is proportional to the diameter of the SiNW TFET and decreasing the diameter will lead to a better Ion /Ioff ratio. Device design and physics detailing the impact of drain and source engineering was discussed for SiNW TFET for lower off-state leakage current and a higher Ion with a steeper subthreshold swing S. Lastly, we have also investigated the effect of using high-k dielectric material and shorter gate length for SiNW for the future device applications. I. INTRODUCTION gate modulation gives a better Subthreshold swing which is smaller than 60 mV/decade and Lower Ioff Leakage Current of 10-14 A/um.[1],[2] Apart from Tunneling Field-Effect Transistor (TFET), Si...

Words: 5566 - Pages: 23


...the metal contacts lie on using piezoelectric actuator. The gap can be controlled to a precision of picometers. Yes, steel can be used as substrate because of its high tensile strength. b) What is sequential tunneling and what is coherent tunneling in molecular electronics? Ans: There are three types of transport mechanisms in molecular junction 1) Coherent tunneling 2) Sequential tunneling 3) Thermal hopping a) Coherent tunneling: * Coherent tunneling is process in which electron resonant tunneling from left electrode into right electrode without scattering in the quantum well. * Rate (probability) drops dramatically with distance between electrodes. * Electron experience no phase-coherence breaking events (e.g. scattering process) throughout the structure. b) Sequential tunneling: * The electron resonant tunneling from left electrode into quantum well can lose part of its energy (or become localized) in the quantum well, and finally tunneling into right electrode It occurs when electron scatters off an impurity or with a vibrational state in the junction two types of scattering – i) Elastic scattering: electron energy unchanged. ii) Inelastic scattering: electron loses or gains energy. * The sequential tunneling is smaller distance dependence. c) Briefly explain the working principle of a Catenane-based molecular switch. Use a graph to help explain the concept. Why does the I-V characteristics of catenane......

Words: 743 - Pages: 3

Lesson 10 Research Ssignment

...personal information through a tunneling protocol – such as the P2P tunneling protocol – and security procedures. Over the Internet, a VPN uses public circuits that lots of users share. With some changes like high security measures, it can be created that only you can access and understand thoroughly. It is also an example of a creative use of the Internet. A VPN offers some advantages, but only if the Internet is used as a transfer medium. It can be created between any two points and is relatively economical. Also, if an Internet connection is achieved, the data that is transferred is free. A VPN also has a couple disadvantages, though. Its design and implementation can be complex, and reliability might become a factor. EDI is an electronic transaction between two companies. The bank’s funds can also be electronically transferred, too. VPN communications link isn’t completely private, so a better option would be to use some leased telephone lines. Some banks might need the telephone company to install a special circuit, though. There are some speeds (measured in Mbps); however, higher speeds can be more costly to implement. Establishment of EDI/XML Techniques A virtual private network (VPN) is a data network connection that makes use of the public telecommunications infrastructure but maintains personal information through the use of a tunneling protocol and security procedures. A tunneling protocol, such as the Point-to-Point (P2P) Tunneling Protocol, is the command set......

Words: 836 - Pages: 4

Afm, Nanomaterial, Cellulose

...VoLUME 56, NUMBER PHYSICAL REVIEW LETTERS 9 3 MAR. cH 1986 Atomic Force Microscope G. Binnig"~ and C. F. Quate' Edward L Gi.nzton Laboratory, Stanford University, ' Stanford, California 94305 and Ch. Gerber" IBM San Jose Research Laboratory, San Jose, California 95193 I, Received 5 December 1985) The scanning tunneling microscope is proposed as a method to measure forces as small as 10 N. As one application for this concept, we introduce a new type of microscope capable of investigating surfaces of insulators on an atomic scale. The atomic force microscope is a combination of the principles of the scanning tunneling microscope and the stylus profilometer. It incorporates a does not damage the surface. Our preliminary results in air demonstrate a lateral resoluprobe that 0 0 tion of 30 A and a vertical resolution less than 1 A. PACS numbers: 68.35.Gy %e are concerned in this paper with the measurement of ultrasmall forces on particles as small as single atoms. %e propose to do this by monitoring the elastic deformation of various types of springs with the scanning tunneling microscope (STM). ' It has been a common practice to use the displacement of springs as a measure of force, and previous methods have relied on electrostatic fields, magnetostatic fields, optical waves, and x rays. Jones~ has reviewed the devices that use variable capacitances and he reports that displacements of 10 4 A can be measured.......

Words: 2837 - Pages: 12

Virtual Private Networks

... * Building to building: This will allow AJAX networks in different cities to connect to each other without the use of leased lines. In a typical VPN setup, two computers would communicate through what is called a VPN tunnel. When we refer to tunneling we are speaking of the process of encapsulating packets within other packets to protect their integrity and privacy during transit. During the tunneling process tasks such as encryption, packet forwarding, authentication, and masking of IP private addresses are performed. An easy way to look at tunneling is the data from one user is sent privately to another user through a tunnel over a public network. Three protocols allow for this transmission- Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Internet Protocol Security (IPSec). This first of these protocols is Point-to-Point Tunneling Protocol. This protocol was designed by Microsoft. PPTP was designed to create a secure tunnel between two computers by providing encryption and authentication encapsulating PPP packets within internet protocol packets. This protocol is typically used for local area network to local area network or dial up connections. The next protocol is Layer 2 Tunneling Protocol This works like PPTP but does not include encryption. The last protocol is IPSec. Unlike L2tp this provides encryption. This is often used with L2TP to provide a more secure connection. AJAX Network The network diagram below......

Words: 1935 - Pages: 8

Atomic Force Microscope

...AFM Tutorial Within the past decade, a family of powerful surface imaging techniques, known collectively as scanned probe microscopy (SPM), has developed in the wake of the invention of the scanning tunneling microscope (STM). Each scanned probe technique relies on a very sharp probe positioned within a few nanometers above the surface of interest. Some combination of probe and/or substrate positioning is required to provide sub-nm-resolution, three-dimensional motion of the probe relative to the substrate. When the probe translates laterally (horizontally) relative to the sample, any change in the height of the surface causes the detected probe signal to change. In general, if the probe signal decreases, this means that the point on the surface directly beneath the probe is farther from the probe than the previous point was. Conversely, if the probe signal increases, then the point on the surface is closer to the probe than the previous point. The electronic circuit that controls the vertical position of the probe relative to the sample uses these changes in the probe signal as sensory feedback to decide which direction (up or down) to move the probe to maintain a constant probe signal. When the probe signal decreases, the circuit realizes that the surface is now farther away, so it moves the probe down until the signal increases to the same level that was measured at the previous point. Similarly, the circuit responds to increases in probe signal by moving the probe up,......

Words: 1788 - Pages: 8

Crytographic Security Unit 1

...Unit 1 – Individual Project ITAS367 – Principles & Methods in Cryptographic Security KEY: 2314746 MESSAGE: The transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptology (ignore the comma and the period in the message). To begin as stated in the message, ignore all punctuation in the message and remove all spaces so that the new message to encrypt will look like this: ThEtranspositionciphertechniqueworksbypermutingthelettersoftheplaintextItisnotverysecurebutitisgreatforlearningaboutcryptologyignorethecommaandtheperiodinthemessage Then using the given key you will begin to organize the given message so that it may be encrypted, like this: 2 | 3 | 1 | 4 | 7 | 4 | 6 | T | H | E | T | R | A | N | S | P | O | S | I | T | I | O | N | T | E | C | H | N | I | Q | U | E | W | O | R | K | S | B | Y | P | E | R | M | U | T | I | N | G | T | H | E | L | E | T | T | E | R | S | O | F | T | H | E | P | L | A | I | N | T | E | X | T | I | T | I | S | N | O | T | V | E | R | Y | S | E | C | U | R | E | B | U | T | I | T | I | S | G | R | E | A | T | F | O | R | L | E | A | R | N | I | N | G | A | B | O | U | T | C | R | Y | P | T | O | L | O | G | Y | I | G | N | O | R | E | T | H | E | C | O | M | M | A | A | N | D | T | H | E | P | E | R | I | O | D | I | N | T | H | E | M | E | S | S | A | G | E | X | X | X | The message is imputed into the......

Words: 433 - Pages: 2

[BDMV][130313][Cat's Eye S1+S2][Blu-ray Box] | saison 3, épisode 10 - Le troisième homme | System Shock Dilogy (Eng/Rus) [RePack] Подробнее... Залито: 10-06-2013 15:59 (5084 просмотра) System Shock Dilogy (Eng/Rus) [RePack] Старые игры для PC Раздают: 0 Качают: 0 Размер: 1011MB