Encrypting in Networking: Implications of Unencrypted Data

  • Thread starter Thread starter Reshma
  • Start date Start date
Click For Summary
SUMMARY

Encrypting in networking is crucial for protecting data from man-in-the-middle attacks, utilizing public key cryptography and authentication services like Kerberos. Unencrypted data poses significant risks, as it can be intercepted by malicious actors. Users should avoid entering sensitive information on sites lacking encryption, as these sites can expose personal data. The discussion highlights the importance of understanding encryption protocols and the limitations of security measures on unencrypted platforms.

PREREQUISITES
  • Understanding of public key cryptography
  • Familiarity with authentication services like Kerberos
  • Knowledge of encryption algorithms (e.g., RSA, AES)
  • Awareness of SSL/TLS protocols for secure communication
NEXT STEPS
  • Research the implementation of SSL/TLS for web security
  • Explore the differences between symmetric and asymmetric encryption
  • Learn about the role of Certification Authorities in encryption
  • Investigate common vulnerabilities in unencrypted data transmission
USEFUL FOR

Network security professionals, web developers, and anyone concerned with data privacy and encryption practices in online communications.

  • #31
TsunamiJoe said:
I wasn't speaking of port blocking, but when requiring a set of passwords of which are encrypted so that they can be planely seen, except by the other communicating machine.
You didn't realize you were talking about port blocking, but you were. There are no port-level cryptographic authorization schemes. You can deny connections by IP, but that's about it. Anyone can connect to an open port on another machine. Authorization using cryptography is done by a server servicing that port at the application level -- much, much higher than the port itself.
This is not entirely so, when using a file sharing program, most often the program will merely know your IP, so that someone wanting access to the information being sent could merely "spoof" there IP and pretend they were one of the machines(personaly i would say that the user receiving the file would be the one to spoof, as to promote less work by the middleman in not having to get into the other persons system prior, but to instead just walk into the connect) then simultaniously send it out to the real user spoofing the senders' IP.
And where would the real packets go? Would you just use your super-laser-ray and obliterate them off the ethernet wires?
I was not claiming your ignorance, I'm merely presenting another side to an argument, and if you wish to degrade to using pety comments such as this to proove your point, then I no longer have any position in this debate anymore. It was nice, and a great debate while it was being upheld properly. I hope you, Reshma, got the answers you were seeking.
We're not conducting a debate. You're saying things that are wrong. I, and others, are correcting you. Whether or not it's worth doing, only you can say.

- Warren
 

Similar threads

  • · Replies 27 ·
Replies
27
Views
3K
  • · Replies 2 ·
Replies
2
Views
1K
Replies
5
Views
2K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 52 ·
2
Replies
52
Views
6K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 9 ·
Replies
9
Views
4K
Replies
7
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K