Monday, September 9, 2019
Nextguard Technologies Research Proposal Example | Topics and Well Written Essays - 2250 words
Nextguard Technologies - Research Proposal Example However, user credentials are required for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada and New York. As all applications are hosted on the Phoenix site, they should be configured on HTTPS and must use a VPN tunnel for exchanging data with the other 4 sites. Moreover, for adding an extra layer of security, MAC addresses should be linked with WAN IP addresses requesting access to one of the hosted applications. Access Control policy should be drafted that will address access to whom and why. A responsible, Accountable, Consulted and Informed (RACI) chart should be developed, as it will define roles and responsibilities for each user permitted to access web based applications. 2 Blowfish Encryption Algorithm for NextGuard As per computer desktop encyclopedia Blowfish encryption algorithm is defined as ââ¬Å"A secret key cryptography method that uses a variable length key from 32 to 448 bits long. It uses the block cipher method, which breaks the text into 64-bit blocks before encrypting them. Written by Bruce Schneier, as a free replacement for DES or IDEA, it is considered very fast and secureâ⬠and as per network dictionary, it is defined as ââ¬Å"Blow?sh is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable useâ⬠. Blowfish is an encryption algorithm that was invented by Bruce Schneier in 1993 (Pachghare, 2009). It is constructed on a variable length key ranging from 32 buts to 448 bits that is considered to be perfect for both local and international use along with a solid enc ryption algorithm. After its recognition to be relatively solid encryption algorithm, it is gradually gaining acceptance. Some of the core features of blowfish algorithm include (Pachghare, 2009): Blowfish has a block cipher of block consisted of 64 bit The length of the key can be up to 448 bits BladeCenter web interface: MM Control, Login Profiles page. (n.d.) On 32 bit microprocessor architecture, data encryption is supported at a rate of 18 clock cycles on every byte that is much quicker than DES and IDEA encryption. It is still free to use and is not patented Memory requirements for blowfish are less than 5 kilobytes of memory The semantics are simplified and is relatively easy to deploy The design requirements for a blowfish encryption algorithm incorporates robust, simple to code, compact, easily modifiable and flat key space features (Anderson, 1994). Likewise, flat key space facilitates random strings to be considered as a possible key from a required length. Moreover, it d eploys data in massive byte size blocks and incorporates 32 bits blocks where applicable (Anderson, 1994). Key ranges, as mentioned earlier are from 32 to 448 bits and operations are common that are supported by microprocessors such as XOR, table lookup etc. furthermore, pre-computable sub keys are applicable with variable iterative numbers. These sub keys are massive and must be pre-calculated prior to encryption or decryption process carries out. In an example below, letââ¬â¢s assume that P is pre-calculated array consisting of 18, 32 bit sub keys from P1, P2â⬠¦ till P 18. In addition, there are S boxes (32 Bit) indicated by S with entries equal to 256 each (John Rittinghouse & Hancock, 2003). S1, 0, S1, 1â⬠¦S1, 255; S2, 0, S2, 1â⬠¦.S2, 255; S3, 0, S3, 1â⬠¦
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.