Saturday, October 5, 2019

Cracking time for different protocols Essay Example | Topics and Well Written Essays - 500 words

Cracking time for different protocols - Essay Example 2). This is because these protocols do not need the usage of encoded that could make sure the privacy or discretion of email messages. Another example of how different protocol designs affect the time needed to hack is intrusion hacking. Intruders use a range of attacking mechanisms to acquire access to networks. These mechanisms consists of password-cracking mechanisms, protocol cracking, and manipulation instruments (Miltchev et al., n.d., p. 7). Detection mechanisms used by intruders help identify alterations and alternatives that occur inside networks faster in TCP/IP than POP3 or SMTP protocols. An IT team called Nohl attempted to crack the OTA protocol in 2011 and realized its design is far more secure than any products by Microsoft or Linux. Hacking the OTA protocol took the team longer to get through by sending commands to a number of SIM cards than cards with other types of security protocols such as Java (Olson, 2013). Protocol performance affects cracking time by decreasing the number of surged weak points in the respective network. Protocols with significantly better performances have environments with few weak points. In such settings, a well performing protocol dos not timeout frequently (Miltchev et al., n.d., p. 7). For example, a study conducted on protocol HACK found out that it was better than SACK because of SACK’s continuous timeouts. On the other hand, HACK was able to maintain data stream to some degree. This performance was in fact six times better in terms of output than SACK in the existence of surge errors (Balan et al., 2002, p. 359). Another case of the cracking time of protocols depending on the frequency of weak points is 2013’s powerful supercomputer NUDT Tianhe-2Â  ability to crack a 128-bit AES code. Researchers estimated that the supercomputer would take over 333 million years to crack this key, which is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.