The fundamentals of creating a VPN are Authentication, strong Encryption and
a method of secure Key Exchange. Authenticate the users, securely exchange keys
for encryption then encrypt the data using the generated keys.
Something you have - can be a key card, a security pass, drivers licence, a
passport or similar. Something you are - A physical characteristic of your body
such as your finger print, the retina print of your eye or your DNA.
Encryption is a means of taking some plain readable text into a cipher text
utilizing some form of algorithmic mapping. Encryption systems must use
mathematically complex algorithms so as to provide a good enough deterrent from
attackers to be able to use some brute force method of calculating the
algorithm in use. Two common methods of encryption are Symmetric Encryption
Systems and Public Key Encryption Systems:
Symmetric encryption simply uses an identical key for encryption of the
plain text and decryption of the cipher text. The encryptor applies the key to
the plain text data which results in a cipher text. The decryptor reverses the
by applying the same key to the cipher text to reveal the plain text data. The
most common symmetric encryption system is the Data Encryption Standard (DES),
of which there are several variations.
Public Key Encryption systems are a lot more complex than symmetric
encryption systems such as DES and depend upon mathematical functions that are
often referred to as "trap-door" functions. They involve complex
mathematical formulae which normally involve exponentiation to high powers,
modular arithmetic and the products of large prime numbers. The algorithms
yield an encryption mechanism and an encryption key which can be made public
and a decryption algorithm and decryption key that is kept secret. The
mathematics of the algorithms is so complex that it is not possible to deduce
the decryption mechanism from the encryption mechanism alone.
You may have noticed people in public wearing wristbands
with a message embossed or debossed on them. It is mostly popular amongst the
youth where they are often known to be a part of awareness campaigns that are
often known to make use of wristbands as promotional products. The message that
these wristbands contain are known to spread like wildfire.
Organisations make use of wristbands for their promotional
and branding tasks as they are comfortable, attractive as an accessory, and
have a feature of being hi-vis. It is a better option than stamping people's
hands with messy inks and missing out on most attendees especially when there
is a crowd.
You may be at a public place that is crowded, and you have
your children in tow, you child can be kept safe when they wear such wristbands
customised with your contact details. These bands are colourful and have hi-vis
features that can easily allow you to trace your child in case you part ways in
the crowd. • Tyvek Bands
• Silicone or Vinyl Bands
• Plastic Bands
• Fabric Bands
Belum ada tanggapan untuk "Definition of VPN Authentication and Encryption"
Posting Komentar