Need of Secure Protocol

Swaraj Mane
6 min readMay 20, 2021

--

What is Secure Protocol?

Secure protocol or also termed as Network security protocols are a kind protocol that ensures the safety and integrity of knowledge in transit over a network connection. Network security protocols define the processes and methodology to secure network data from any illegitimate plan to review or extract the contents of knowledge .
These security protocols are primarily designed to stop any unauthorized user, application, service or device from accessing network data. This applies to virtually all data types no matter the network medium used.
Network security protocols generally implement cryptography and encryption techniques to secure the info in order that it can only be decrypted with a special algorithm, logical key, mathematical formula and/or a combination of all of them.

Why is Network Security so important?

Securing the info on your network might not seem vital to you until you lose your data or the privacy of your data content because you’ve got no security on your network.
Network data security should be a high priority when considering a network setup thanks to the growing threat of hackers trying to infect as many computers possible. For corporations, security is vital to stop industry sabotage and espionage. Imagine what can happen if there’s a network integrity breach at a bank, stock market , or other financial data base.
There are various categories of protocols like routing protocols, mail transferring protocols, remote communication protocols, and lots of more. Network security protocols are one such category that creates sure that the safety and integrity of the info are preserved over a network. Various methodologies, techniques, and processes are involved in these protocols to secure the network data from any illegitimate plan to review or extract the particular content of knowledge.

Data breaching

Data breach occurs when a hacker steals or uses sensitive information from a system without the authorization or knowledge of the system’s owner.

The following statistics show how data-breach has become an issue:
- Almost 15 billion records have gone lost or been stolen since 2013 due to data breaches.
- In 2017, 85% of all data breaches round the globe happened in North America.
- Over 5 billion records are compromised within the half of 2018 alone.

How to be secure then?

IPSec protocol
In computing, Internet Protocol Security may be a secure network protocol suite that authenticates and encrypts the packets of knowledge to supply secure encrypted communication between two computers over an online Protocol network. It is used in virtual private networks (VPNs).

IPsec includes protocols for establishing mutual authentication between agents at the start of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows between a pair of hosts , between a pair of security gateways , or between a security gateway and a number . IPsec uses cryptographic security services to guard communications over Internet Protocol networks. It supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality and replay protection.

Types of Algorithms used:

a) Symmetric encryption algorithms

b) Key exchange algorithms

c)Authentication algorithms

How Ipsec works?

SSH (Secure Shell)

SSH (Secure Shell)
SSH may be a software package that permits secure system administration and file transfers over insecure networks. it’s utilized in nearly every data center and in every large enterprise. SSH uses public-key cryptography to authenticate the remote computer and permit it to authenticate the user, if necessary. There are several ways to use SSH:

a) one is to use automatically generated public-private key pairs to easily encrypt a network connection, then use password authentication to go online .

b) Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. during this scenario, anyone can produce an identical pair of various keys (public and private). the general public key’s placed on all computers that has got to allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is predicated on the private key, the key itself isn’t transferred through the network during authentication. SSH only verifies whether an equivalent person offering the general public key also owns the matching private key.

SSH panel
In all versions of SSH it’s important to verify unknown public keys, i.e. associate the general public keys with identities, before accepting them as valid. Accepting an attacker’s public key without validation will authorize an unauthorized attacker as a legitimate user.

Transport Security Layer (TLS):
Transport Layer Security may be a widely adopted security protocol designed to facilitate privacy and data security for communications over the web . A primary use case of TLS is encrypting the communication between web applications and servers, like web browsers loading an internet site . TLS also can be wont to encrypt other communications like email, messaging, and voice IP (VoIP).
TLS was proposed by the web Engineering Task Force (IETF), a world standards organization, and therefore the first version of the protocol was published in 1999.The most recent version is TLS 1.3, which was published in 2018.
There are three main components that TLS protocol accomplishes:Encryption, Authentication, and Integrity.
- Encryption: hides the info being transferred from third parties.
- Authentication: ensures that the parties exchanging information are who they claim to be.
- Integrity: verifies that the info has not been forged or tampered with.

HyperText Transfer Protocol Secure (HTTPS):

Hyper Text Transfer Protocol Secure (HTTPS) is that the secure version of HTTP, the protocol over which data is shipped between your browser and therefore the website that you simply are connected to. The ‘S’ at the top of HTTPS stands for ‘Secure’. It means all communications between your browser and therefore the website are encrypted. HTTPS is usually wont to protect highly confidential online transactions like online banking and online shopping order forms. HTTPS creates a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, as long as adequate cipher suites are used which the server certificate is verified and trusted.
Encryption types in HTTPS: It uses a Transport layer security(TLS)

a) 128 bit encrypt HTTPS
b) 64 bit encrypt HTTPS

Kerberos

Kerberos is another network validation protocol that was intended for providing a robust authentication between client-server applications with the assistance of secret-key cryptography. consistent with the Kerberos network validation protocol, all of its services and workplaces correspond to an insecure network, making it safer and responsible.
The main components of Kerberos are:

a) Authentication Server (AS):
The Authentication Server performs the initial authentication and ticket for Ticket Granting Service.

b) Database:
The Authentication Server verifies access rights of users in database.

c) Ticket Granting Server (TGS):
The Ticket Granting Server issues the ticket for the Server

--

--