Tuesday, January 28, 2020

Triple Des Against A Brute Force Attack Computer Science Essay

Triple Des Against A Brute Force Attack Computer Science Essay Over the last few years, the Internet has evolved into a ubiquitous network and inspired the development of a variety of new applications in business and consumer markets. So, Multiprotocol Label Switching is another Challenge and a versatile solution to address the problems faced by present- day networks. Main objective of MPLS is to provide Security in the data exchanged. So, In this paper we have implemented Encryption Algorithms like AES, DES and Triple DES to provide sufficient levels of security for protecting the Confidentiality of the data in MPLS Network. This Paper also analyzes the Performance of these algorithms against Brute-Force Attack implemented in the MATLAB environment to protect the MPLS Network MPLS stands for Multiprotocol Label Switching, is a technology proposed by Internet engineering Task Force (IETF) it was designed to facilitate several problems areas in the internet including routing performance and is increasingly being adopted by service providers in their core networks. MPLS solutions are to be used with Layer2 and Layer 3 Protocols. MPLS has emerged as a potential solution for addressing traffic engineering, security and survivability for IP networks. So, a label is assigned to a packet when it enters the MPLS network at ingress Label Switched Router [1]. So, a label is a short fixed length identifier which is of 20 bits ranging from 0 to 19 that is used to forward the packets. Within the network the labels are used to route the packets without regard to the original packets header information. So, in this paper to secure the data which is attached with the label, various Encryption algorithms like AES, DES and Triple DES has been implemented on MPLS network. Ou r technique does not require any hardware, it is totally based on software.Following Sections discusses the proposed scheme. Section 2 discusses the Security Requirements of MPLS network. Section 3 gives the quick overview of the various encryption algorithms used in this technique. Section 4 walks through the used setup environment and the settings for the encryption algorithms on MPLS. This section also illustrates the performance evaluation methodology chosen settings to allow for a better comparison. Section 5 gives a thorough discussion about the implementation results. Finally, Section 6 concludes this paper by summarizes the key points and other related information. 2. Security Requirements of the MPLS Network Network Managers have many options for site to site connectivity like Traditional leased lines, ATM based connectivity and frame relay. But other two types of modern VPNs i.e MPLS and IPSec are becoming increasingly attractive to network managers [2]. In pure IP network it is easy to spoof IP addresses which is a key issue in Internet Security. But, because MPLS works internally with labels, instead of IP addresses, so it not so easy to breach the security. The very fact to make concept clear is that it is not possible to insert packets with wrong labels into the MPLS network from outside, since the customer edge(CE) is unaware of the MPLS core and thinks that it is sending IP packets to the router [3]. The intelligence is done in (PE) provider edge device where based on the configuration, the label is chosen and prepended to the packet. So, MPLS is more secure than normal IP addressing technique. But, the spoofing here can also be possible. The attacks like brute force attack can break the security, although it is not so easy, but it can do so. MPLS alone cannot provide security, it can be combined with IPSec to provide sufficient levels of secu rity. So, various encryption and hashing algorithms are used to maintain the confidentiality of the data. IPSec requires each side to authenticate with the other, so privacy is maintained in IPSec VPN through the use of encryption. A secure MPLS network provides the following facilities to its users [2]: Data Confidentiality: IPSec VPNs provide data confidentiality through robust encryption algorithms. It seeks to ensure data confidentiality by defining a single path between physical sites on a service provider network. This prevents attackers from accessing transmitted data unless they place sniffers on the service provider network. Though MPLS minimizes the chance that data may be intercepted, IPSec provides better confidentiality through encryption. Data Integrity: IPSec uses hashing algorithms to ensure data integrity. There are inherent methods as such to provide data integrity within MPLS VPNs. However, the odd of data being shared by a man-in-the-middle attack is low due to the separation address space and routing information provided by MPLS VPNs. Data Availability: IPSec relies on the Internet for transport. Although an attacker could not read the data, but it could DOS an IPSec VPN by entering false routes into the Internet Routing tables. MPLS VPNs rely on LSPs i.e. Label Switched Paths for transport and since LSPs have local significance only, spoofing is difficult to accomplish. Thus MPLS, can provide better data availability in this regard. Service Reliability: MPLS has the ability to protect the communication session against denial of service attacks. 3. REQUIREMENT OF ENCRYPTION ON LABELS IN MPLS NETWORK In this paper encryption on labels in MPLS network is proposed using AES, DES and Triple DES encryption algorithms. For implementing and evaluating above encryption algorithms we have done the following steps: Encrypt the data with one of the above mentioned algorithms. Encode the data according to MPLS. Brute Force Attack has been done. Time taken to find a correct key is measured against different key lengths. Data Label Encrypt Label Data MPLS Decrypt Secret Key Brute Force Attack Figure 1. Data Encryption This paper analyzes the effectiveness of AES, DES and Triple DES encryption algorithms against brute force attack on MPLS network. The comparison has been conducted by running brute force attack program against these algorithms. 3.1 Implementation Setup This section describes the implementation environment and the used system components. The implementation of DES, Triple DES and AES uses classes available in JAVA package javax.crypto. Separate functions for encryption and decryption have been implemented in MATLAB using JAVA cryptography API. Figure 2 JAVA Cryptography Package Brute Force program is implemented in MATLAB environment. This implementation is thoroughly tested and is optimized to give the maximum performance for the algorithm. 3.2 Methodology Used This Section will discuss the methodology and its related parameters like: system parameters, experiment factors and experiment initial settings. 3.2.1 System Parameters The experiments are conducted using Intel 64-bit processor with 32 GB of RAM. The program is written in MATLAB. The experiments will be performed couple times to assure that the results are consistent and are valid to compare the different algorithms .The brute force attack has been done using single PC. It can be enhanced by the use of parallel computers with high computational powers to decrease the time required to find the key for the above algorithms. 3.2.2 Experiment Factors In order to evaluate the performance of the compared algorithms against brute force program on MPLS networks, the experimental factors must be determined. The chosen factors here to determine the effectiveness of encryption algorithms are the key length and the time taken to breach an algorithm by brute force program. 3.2.3 Experimental Initial Setting We started the attack with 8 bit of key length and extended upto 64 bit. It can further increased upto supported key length of AES algorithm i.e 256 bits. But for this high computational power is required in terms of parallel computers to breach the algorithms. 4. Results and Discussions This Section will show the results obtained from running the brute force program on AES, DES and Triple DES. The results of implementation have been shown below in the form of graphs. The time of launch of brute force attack is shown at the start of the program as in Fig. 3. Figure 3 Screenshot of running brute force program The program exits on success of the attack on the encryption algorithm which is shown below in fig. 4 Figure 4. Screenshot of cracked algorithm The time required to break the encryption algorithm, actual encrypted string and the label applied, all are shown in fig. 5 Figure 5 Screenshot of various factors like time to break, actual encrypted string and the label applied It is highlighted here that the implementation has been performed assuming that the user has arrived at all the correct values of the key and only two values of the key is to be cracked. This has been done to save the time required. The key length can be optimized to reduce the time taken for encryption and decryption process so that it does not slow down the system. i) Effect of key length variation We compare the change in security performance by using different key lengths for encryption algorithms. Graphs are plotted between the time required to find the correct key and different key lengths. We have taken six different scenarios by increasing the length of the key. Table 1 DIFFERENT KEY LENGTHS Scenario Key length (Bits) 1 8 2 16 3 24 4 32 5 40 6 48 7 56 8 64 Following are the graphs for scenarios stated in table1. These graphs show the number of seconds required to breach the corresponding algorithm against brute force attack. Figure 5 Number of seconds required with key length of 8 bits Figure 6 Number of seconds required with key length of 16 bits Figure 7 Number of seconds required with key length of 24 bits Figure 8 Number of seconds required with key length of 32 bits Figure 9 Number of seconds required with key length of 40 bits Figure 10 Number of seconds required with key length of 48 bits Figure 11 Number of seconds required with key length of 56 bits Figure 12 Number of seconds required with key length of 64 bits The above graphs show the time taken to find the key by the brute force program on DES, Triple DES and AES for different key lengths. From these graphs it is analyzed that time taken by brute force attack increases exponentially with the increase in key length. It is clear from the graphs that in case of AES algorithm, brute force attack takes more time to find a key. Therefore, it has a better security than DES and Triple DES. i) Effectiveness of algorithms against brute force attack The results of the iterations of brute force program have been shown in the below figure in Table 2. This graph is plotted in MATLAB environment. The above data and graph represents the effectiveness of AES, DES and Triple DES algorithms against brute force attack. It is evident from the data presented that AES proves to be of better security against the brute force attack than DES and Triple DES for securing MPLS network. Figure 13 Effectiveness of AES, DES and Triple DES against brute force attack Table 2 Number of seconds required to breach DES, Triple DES and AES KeyLength (bits) DES (Seconds Triple DES (Sec) AES (Sec) 8 0.27 0.31 0.55 16 39.59 52.11 110.44 24 1442.52 4575.13 17443.22 32 3085.02 10534.81 36758.31 40 7765.12 21435.13 78252.12 48 15229.91 44671.11 156277.81 56 30118.73 89212.15 330115.42 64 65416.91 122294.54 775313.21 5. CONCLUSIONS The presented results showed that AES has a better security than DES and Triple DES against brute force attack since AES takes more time to break by brute force program for a given key length. Time taken by AES algorithm to break the security considerably increases with the increase in key lengths. respectively.

Sunday, January 19, 2020

Eulogy for Father :: Eulogies Eulogy

Eulogy for Father "I have been having a lot of feelings since my father's illness and death and we will see how long the feelings will allow me to speak. By far the biggest feeling I have had has been gratefulness. Gratefulness to have stood in the shade of my father's tree. Because to me my father was like a tree in many ways. An oak tree. An oak who's taproot was anchored in faith and in the Divine, and with branches and leaves that act as a home for those around. I stood in that home and for that I am so grateful. It's an experience that I wish I could condense into a couple of words and then tell you. People I talk to say sometimes "I guess you can't expect your family to be like the Brady Bunch." I don't have the heart to tell them that I wouldn't ever trade my family for that, nor for anyone. It was an incredible experience to grow up in my family with my mother and father. My father’s tree was stable, you couldn't push it, and it was strong. It was a place for everyone around him to glow. He wanted others to glow. He enjoyed and reveled in the glow of everyone around him...not only his own. It is a beautiful thing for a man to be able to do that. I honor him for that. And boy, do I feel a little dwarfed by comparison. A couple of weeks ago I told him, "Dad, you have always done things so deliberately and calmly you have been a great role model for me. I just feel so overwhelmed by trying to follow in your footsteps." He looked at me and motioned with his hand as if throwing a ball at me and said, "Oh you're all right." Somehow that "oh you're all right" was the biggest blessing. He had told me many times that he loved me, that he was proud of what I did, but this sunk deeply into me and I felt it as a blessing from him like I had never received before. All the times my father told me of his love for me, or how he was proud of what I was doing or what ever, were still with me but this simple phrase moved me in a unique way. I think I can speak for all of my siblings when I say that we always knew within our family that we were loved.

Saturday, January 11, 2020

Discrimination in US Judicial system

America judicial system has been accused of discrimination especially when it comes to mandatory sentences. There has been a serious disparity as far as sentences are concerned with some groups seemingly being favored by the law while others have been treated harshly. This state of affair is sad for this country as it seems to divide the country in classes especially on racial basis. The minority groups, the African American, Latinos and women have been seriously affected making human rights groups to agitate for the change of laws to apply equally among all the groups.These inequalities in the application of the laws seem to be retrogressive as far as our endeavor to make America an all equal country is concerned. The judicial system seems to be applying the law unfairly making some feel less American than others. This does not auger well for the national cohesion as the disadvantaged group may feel that this is an attempt to sideline them on various lines and they may opt to solve the problem in whatever means available to them including violence therefore affecting the America stability.These disparities not only affect the guilty but also the innocent who are harshly sentenced for the crimes they did not commit. (Kinzie, M 2002) This may be detrimental for the fight against crime. If we continue punishing so harshly and furthermore seem to discriminate, the crime rates will only rise as people especially those who are directly or indirectly affected by this discrimination in justice register their dissatisfaction on the unfair treatment opting to use violence. To fully address the disparities in sentencing in our judicial system, causes of this unfair treatment by our system need to be addressed carefully.Police Department which is charged with the role of apprehending the law offenders has been identified as on of the areas where the discrimination is so rampant. Many Americans have reported being searched or even arrested for the crimes the have not commi tted only because they had a different color or spoke with a different accent from that of the arresting officer. I t is the police who arrest and align the suspected law breakers to the court. I f they are biased in terms of race or other aspects the suspects may not feel that they will receive a fair treatment.The treatment may further be extended to the sentencing itself, therefore making the victims lose confidence on our judicial system. (Jeremy, K. 2004) Human rights groups have reported that there have been more arrests as far as minority groups are concerned. This has created a perception that the minorities commit crime than their white counterparts, this perception has even been extended to our judicial system with our judges being biased when a case involving a person from a minority, instead of looking critically at the facts laid down the issue of race clouds the system making him or her rule a harsh treatment.We may not entirely blame the police and the judges alone fo r the unfair treatment of the subject but our law system have failed to address the issues at hand. The laws seem to be biased from the word go and this perhaps is where the problem lies. Judges base their sentences on the law; the law prescribes a certain punishment on a particular crime committed. There are some of the laws that seem to be lenient on some offenders. Althugh this may not be directly proved there exists some disparities as far as sentences prescribed are concerned.Looking at the punishment through a social perspective one may not fail to notice that there is some form of discrimination of certain groups. A good case at hand is the issue of drugs, cocaine is one of the drugs that is abused by Americans of all walks of lives be they poor, rich, black, white and Latinos. Surprisingly the sentences prescribed differ when it comes to the type of cocaine in question. There are two types of coaine; the powdered form and the crack which is cooked in baking soda. Crack is ma inly used by the black and the Latinos populations while the powdered cocaine is mainly consumed by the rich whites.When the congress was passing this law on drug abuse there was a wrong indication that crack was more addictive than the powdered form and it resulted to more violent among its users therefore heavy punishment for its users as opposed to powder users who got lesser sentences. This law based on this argument, though good to deter the drug users have not addressed the issue at hand as it has been accused of discriminating on the lines of race and social classes. (Wolf, D 2006) American society can also be largely blame for the state of affairs that prevail in our judicial system.The laws are made by our representatives whom we elect, therefore the law makers represents our views and if we do not agree with them there are channels of addressing the issue. Our society is molded in such a way that segregation in terms of race class and other aspects is embraced therefore ou r judicial system just reflect who we are as a society. This does not mean that the status quo must prevail,we should embrace a situation where all are treated equally regardless of the race, creed or even the social class one occupies.This calls for the sensitizing of the masses on the need to look at each other as either brother or sister. This will go along way in creating equality in the society which will eventually been reflected in our laws hence implementation by our judiciary system. ( Hurst, C. 2001) Judicial department has a great role as long as equality in law is concerned, this department is mandated to interpret the law made by our legislators and if they seem to contravene the supreme constitution of our land the department has a responsibility of quashing these laws and advise the lawmakers on the shortcomings of these legislations.The laws which are discriminative in nature not only cause a great division in this nation but also cause great suffering to the victims as they are subjected to harsh treatment sometimes for the crimes they may have not committed but due to their inability to hire competent lawyers they fail to defend themselves therefore being punished. The judicial department should ensure that the judges who handle cases where discrimination may be cited are competent individual and have no history of racial prejudice.The department needs to empower the judges with skills that will ensure they handle such type of cases with seriousness they deserve as it is only through this way that our judicial system will be seen to serve all equally regardless of their race, creed or even the social status they hold in the society. Selection of juries is another area that needs to handled with a lot of caution some of them may be compromised to vote on a certain way which promotes the already existing disparity .The judiciary should make sure that men and women who are selected in the jury are people of high integrity, those who are not bias ed and show high respect for the all people regardless of diversity. Judges need to set precedent on application of the law equally, precedence that should be authoritative such that the whole system will adopt to ensure all who are brought before them are treated with fairness as required by the natural justice and our constitution as well.The judicial department needs to ensure that systems are in place for those who feel they have been discriminated to register their complaints and the necessary remedies taken. The appellate court should be fully empowered to address this issue comprehensively and in a manner that all will be satisfied and justice will have prevailed in such systems. (Murray, F 2003) With the responsibility of interpreting the laws being vested on this department by our constitution.The judicial system should uphold this responsibility and advise the congress to look at all those laws which seem to apply selectively. These laws need to be changed without deviatin g from their initial course of making them, which was to fight crime. They should be applied equally to all. We should not have some groups being treated leniently yet the magnitude of the crime is the same. The judiciary system can save this nation from the agony of going through another era of discrimination in our society.If it upholds the responsibility bestowed by the citizens of America through the constitution it can cement the gains we have so far made as far as eliminating segregations in our community is concerned. Criminals need to be treated equally and fairly, no one should receive punishment which is not equivalent to the crime committed neither should be there lesser punishment for a crime committed. It is only fair application of justice that this department will be viewed in the lenses of equalizing all the America as far as law is concerned. The department cannot accept failing as this will be doom for America as a nation. References Kinzie, M (2002) Product liability and litigation. Clifton Park, Newyork. Jeremy, K. (2004) Discrimination in our laws. American perspective. Straus and Graux.Newyork Wolf, D (2006) Law and the racial politics. Harper Collins, Newyork. Hurst, C. (2001) Crime and the law: social perspective.W.W.Norta, Newyork. Murray, F (2003) American judicial system. Sierra club books, Sanfrancisco

Friday, January 3, 2020

Macbeth, By William Shakespeare - 898 Words

Shakespeare’s Macbeth is an intense tragedy about a man named Macbeth whose hunger for power not only makes him commit murder, but also pushes him over the brink of insanity. In Act 2, Scene 1, Macbeth begins with the line, â€Å"Is this a dagger I see before me, The handle toward my hand† (2.1: 33-34). He is referring to his hallucination of a dagger floating in front of him. This happens after he agrees to go through with the deed, or the â€Å"terrible feat†, of killing King Duncan to secure his foretold fate of being King himself. During this soliloquy, readers get their first glimpse of Macbeth’s powerful imagination. Macbeth is redefining violence by making fantasy just as real as reality. Even while having the knowledge that the dagger could be a fantasy, Macbeth still allows this optical illusion to affect him significantly. When Macbeth realizes that this dagger might be a hallucination, he supposes that it could be because of his â€Å"heat-opp ressed brain† (2.1: 39). â€Å"Heat-oppressed† is Shakespeare’s way of saying â€Å"fevered†. This â€Å"fever† could be a metaphor for Macbeth’s intense, frenzied ambition. He states this could be â€Å"a dagger of the mind† (2.1: 38). One could read this as a metaphor for Macbeth’s hesitation and already guilty conscience as he waits for the bell signal from Lady Macbeth. When he attempts to touch the imaginary dagger he says, â€Å"Come, let me clutch thee. I have thee not, and yet I see thee still† (2.1: 34-35). This paradox is straight iambic pentameter.Show MoreRelatedMacbeth by William Shakespeare770 Words   |  3 PagesThe play Macbeth is written by William Shakespeare. It is believed to be written between 1603 and 1607 and set in eleventh century Scotland. It is also believed to be first performed in 1606. It is considered to be one of the darkest and most powerful tragedies. Macbeth, set in Scotland, dramatize s the psychological and political effects produced when evil is chosen to fulfill the ambition of power. The Tragedy of Macbeth is Shakespeare’s shortest tragedy and tells the story of Macbeth, a ScottishRead MoreMacbeth, By William Shakespeare1425 Words   |  6 PagesMacbeth Just Can’t Wait To Be King Everyone has a quality that they do not like about themselves. Some people struggle to be social, others may be too controlling of people. The list goes on and on, but the point is that everybody has a particular quality that they must learn to control or else that particular quality can get out of hand. Of course, one could write a list of characters that have major flaws. There is no better example than William Shakespeare’s character, Macbeth, in The TragedyRead MoreMacbeth, By William Shakespeare1409 Words   |  6 Pages â€Å"Fair is foul, and foul is fair: Hover through the fog and filthy air.† On October 17th, I had the pleasure of going to see Macbeth performed at the Shakespeare Tavern. Along with its reputation for being â€Å"cursed,† Macbeth is also known as one of the crown jewels of William Shakespeare’s repertoire. In my opinion, the central concept of this particular retelling of the play was the murkiness of character. Throughout the pla y, the many characters go through fierce temptation and strife, and noneRead MoreMacbeth, By William Shakespeare1203 Words   |  5 PagesMacbeth is a play based on King James I, it was written by William Shakespeare, however this play isn’t a king and queen fairy tale, but it’s a play about greed and guilt, chaos and murder and three evil witches who use prophecies to influence Macbeth to do bad things, using flattery would instigate his inner ambition to become king, which in the end doesn’t lead to a very happy ending. Shakespeare’s, Macbeth, was written in the early Jacobean period. During those times, women had no power, theyRead MoreMacbeth, By William Shakespeare1243 Words   |  5 PagesIn William Shakespeare’s â€Å"Macbeth†, the author portrays the main character Macbeth as a very tortured and flawed individual whose actions only serve to further unravel him. He is conflicted and power hungry, which drives him to perform evil murders and become a ruthless person. Macbeth’s moral compass is not resilient enough to withstand his wife’s manipulations and he is provoked to act on his malicious thoughts of murder. The author explores the terrible effects that ambition and guilt can haveRead MoreMacbeth, By William Shakespeare Essay1487 Words   |  6 Pagesreaction†. Macbeth by William Shakespeare is a tale which illuminates the consequences of violating the â€Å"Natural order†, the hierarchy of beings in the universe. When Macbeth, a warrior wel l-known for his courage and bravery, murders King Duncan acting on his unchecked ambition to claim the throne, the order was disrupted, the result†¦chaos. Shakespeare uses symbolism to illustrate the atmosphere of the play as the natural order is flung into a state of turmoil. These techniques used by Shakespeare is usedRead MoreMacbeth, By William Shakespeare1483 Words   |  6 Pagesdifferent references in the play of how a king deals with power and if they use it for better or for their own personal gain. In the play Macbeth, by William Shakespeare, Macbeth’s obsession with his journey to power leads to his failure. This obsession is demonstrated through the prophecies, the murder of his best friend Banquo, and his own demise. Macbeth demonstrates that he is incapable of mastering the power and responsibilities of being a king. This is indicated throughout the play with theRead MoreMacbeth, By William Shakespeare1045 Words   |  5 PagesBlood appears in only two forms, but many times in Macbeth by William Shakespeare; between the war scene at the beginning of the play and the lifting of Macbeth’s severed being lifted by Macduff at the end. It can be said that Macbeth could have been written in blood that there is such a large amount. What is unique about blood in Macbeth is that the â€Å"imaginary blood† or the guilt that the murderer feels plays more of a role of understand and amplifying the theme of the play, that blood is guiltRead MoreMacbeth, By William Shakespeare1431 Words   |  6 Pages Macbeth, though originally a valiant and prudent soldier, deteriorates into an unwise king whose rash decisions conclusively end in the atrophy of his title, power, and position. Several facto rs contribute to the downfall of Macbeth, which produce a contagion effect and ultimately end with his demise. He receives help from his â€Å"inner ambitions and external urgings† which result in his downfall (Bernad 49). The â€Å"external urgings† consist of the weird sisters who disclose his prophecies, which enlightenRead MoreMacbeth, By William Shakespeare2060 Words   |  9 Pagesthe green one red Macbeth Quote (Act II, Sc. II). Out, out, brief candle! Life s but a walking shadow, a poor player that struts and frets his hour upon the stage and then is heard no more: it is a tale told by an idiot, full of sound and fury, signifying nothing. Macbeth Quote (Act V, Scene V). These quotes have been taken from play Macbeth written by William Shakespeare. Like these quotes there are hundreds and thousands of such heart touching quotes written by Shakespeare in his many different