Bhanu Priya has Published 1581 Articles

Differentiate between 4G and 5G cellular Networks

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:53:03

737 Views

Cellular network is a fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.4G cellular network4G is referred as the 4th Generation ... Read More

What are security features and risks in cellular 4G networks?

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:51:32

1K+ Views

4G cellular network is the 4th generation of cellular communications.Features of 4G4G cellular network comes up with many features as follows −10x high speed as compared to 3GThe cost is also less for each bit used.It is highly secured too.It comes up with LTE i.e. Long term evaluation which refers ... Read More

What are cryptography, symmetric and public key algorithms?

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:50:13

5K+ Views

Let us begin by understanding what cryptography is.CryptographyIt is a technique of writing in a secret code which is in an unreadable format to the third parties. Plaintext indicates the data which is in the readable format and also which is not encrypted.The plaintext is converted into cipher text which ... Read More

What is digital certificate and digital signature?

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:49:04

4K+ Views

Let us begin by learning about the digital certificate.Digital CertificateIt is basically a certificate issued digitally, issued to verify a user's authenticity i.e., verifying the user sending a message is who he or she claims to be, and also to provide the receiver with the means to encode a reply.Whoever ... Read More

What are symmetric and Asymmetric key encryptions?

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:47:02

1K+ Views

Let us understand the symmetric key encryption.Symmetric Key encryptionSymmetric-key encryption algorithms in cryptography use a single key or the same cryptographic keys (secret key) shared between the two parties for both encrypting plain-text and decrypting cipher-text. The keys could be identical or there could be a simple change to go ... Read More

Differentiate between SSL and TSL secure layers

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:45:21

398 Views

Secure Socket Layer (SSL) and Transport security layer (TSL) are internet security protocols used for secured communication between the web-browser and the webserver. SSL is the predecessor of TLS so logically TLS is more secure than SSL.DifferencesLet us discuss the differences between SSL and TSL in point wise manner −Point ... Read More

What is ESP in tunnel and transport mode and the difference between AH and ESP?

Bhanu Priya

Bhanu Priya

Updated on 15-Sep-2021 07:42:58

4K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used ... Read More

What is Encapsulating Security Payload(ESP)?

Bhanu Priya

Bhanu Priya

Updated on 13-Sep-2021 13:16:58

9K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used ... Read More

What is Authentication Header (AH) format?

Bhanu Priya

Bhanu Priya

Updated on 13-Sep-2021 13:14:52

11K+ Views

Authentication Header (AH) is used to provide integrity and authentication to IP datagrams. Replay protection is also possible. The services are connectionless, that means they work on a per-packet basis.AH is used in two modes as follows −Transport modeTunnel modeAH authenticates are the same as IP datagram. In transport mode, ... Read More

What is IPsec in computer networks?

Bhanu Priya

Bhanu Priya

Updated on 13-Sep-2021 13:11:27

3K+ Views

IP Security (IPSec) is a collection of protocols which is designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level. It helps to create confidential and authenticated and packets for the IP layer as shown in below diagram −IPSec protocol aim is to ... Read More

Advertisements