1,385
13
Essay, 2 pages (250 words)

Name in the middle attacks in the exchange.

Name Description Advantages Disadvantages   RSA Algorithm RSA is a cryptosystem which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission 1. it is public key cipher 2. RSA algorithm is hard to crack. 3. RSA algorithamuses the public key to encrypt data.   1. Slow signing and decryption, which are slightly tricky to implement securely. 2.

Very slow key generation. 3. Key is vulnerable to various attacks if poorly implemented.          Diffie Hellman A simple public-key algorithm is Diffie-Hellman key exchange . This protocol enables two users to establish  a secret key using a public-key scheme based on discrete logarithms. 1. The sender and receiver have no prior knowledge of each other.

2. Communication can take place through an insecure channel. 3. Sharing of secret key is safe.     1. can not be used for symmetric key exchange.

2. can not used for signing digital signatures. 3. the nature of diffie-hellman key exchange does make it susceptible to man in the middle attacks in the exchange.

Digital Signature DSS is uses the secure hash algorithm a digital signature is an authentication mechanism that enable the creator of a message to attach a code that acts as a signature. 1. Non repudiation, because the author cannot be denied of his work(he created and sent).

2. Imposter prevention Integrity of data, ever change will be detected.         1.

Expiry: Digital signatures, like all technological products, are highly dependent on the technology it is based on. Hash Function Hash function also called as message digest and one way encryption, are in some sense use no key. 1. the  main advantage is syncronization. 2. in many situations, hash tables turn out more efficient than lookup structures. 1.

hash collisions are practically unavoidable. 2. hash tables becomes quite inefficient when there are many collisions.

Thank's for Your Vote!
Name in the middle attacks in the exchange.. Page 1
Name in the middle attacks in the exchange.. Page 2
Name in the middle attacks in the exchange.. Page 3

This work, titled "Name in the middle attacks in the exchange." was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Name in the middle attacks in the exchange'. 2 January.

Reference

AssignBuster. (2022, January 2). Name in the middle attacks in the exchange. Retrieved from https://assignbuster.com/name-in-the-middle-attacks-in-the-exchange/

References

AssignBuster. 2022. "Name in the middle attacks in the exchange." January 2, 2022. https://assignbuster.com/name-in-the-middle-attacks-in-the-exchange/.

1. AssignBuster. "Name in the middle attacks in the exchange." January 2, 2022. https://assignbuster.com/name-in-the-middle-attacks-in-the-exchange/.


Bibliography


AssignBuster. "Name in the middle attacks in the exchange." January 2, 2022. https://assignbuster.com/name-in-the-middle-attacks-in-the-exchange/.

Work Cited

"Name in the middle attacks in the exchange." AssignBuster, 2 Jan. 2022, assignbuster.com/name-in-the-middle-attacks-in-the-exchange/.

Get in Touch

Please, let us know if you have any ideas on improving Name in the middle attacks in the exchange., or our service. We will be happy to hear what you think: [email protected]