Posts

Showing posts from October, 2020

DES(Data Encrypted Standard)

Image
 What is DES? DES is a data encrypted standard in which data is encrypted by using a formula and repeated it 16 times. DES uses diffusion Diffusion is defined as repetition of the formula 16 times for encryption the data/message. DES perform 16 rounds. Input is 64 bit plain text. Output is 64 bit cipher text.  Example of DES is Transposition Technique. Step 1: Initial permutation  Step 2: Diffusion Step 3: Final permutation Initial Permutation: Take a Data/message of 64 bits in this step. Diffusion: performs 16 rounds  In each round, a key Ki is used that is generated by round key generator. Working of round 1 is as follow: Final Permutation: After performing 16 rounds, output is 64 bit cipher text/data/message. Types of DES: Double DES Triple DES Double DES: Only two keys (k1 & k2) are used, and we can say that encryption is performed two times for converting the plain text into cipher text. Security is less as compared to Triple DES. Two times encryption for ci...

Mobile IP(Internet Protocol)- Definition and working of Mobile IP, Key Mechanism in Mobile IP

Image
Mobile IP Mobile IP is a communication protocol(set of rules is called protocol) that allows the user to use the same IP address when user moves from one network to another network. It ensures that the communication will continue without user's session or connections being dropped. Working Of Mobile IP Correspondent node sends the data to the mobile node. Data packets contains correspondent node’s  address (Source) and home address (Destination). Packets reaches to the home agent. But now mobile  node is not in the home network, it has moved into the foreign network. Foreign agent sends the care- of-address to the home agent to which all the packets should be sent. Now, a tunnel will be established  between the home agent and the foreign agent by the process of tunneling. Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism called...