Extremely Secure Communication

نویسنده

  • Daniel Romão
چکیده

Companies nowadays rely on the Internet for various purposes. One of these, is communication between employees or work teams at different locations. Suspicions of governmental agencies performing traffic collection and decryption exist, posing the threat of companies having their Internet communication leaked. This is specially relevant when confidential information is transmitted and their business secrets might be at risk. This research shows how an extremely secure communication on the Internet can be deployed for work teams and individuals around the globe. Having the knowledge that random number generators used for cryptographic operations might contain backdoors, a true random number generator was implemented. This random number generator is based on an older true random number generator project, which uses a single PN junction for noise generation, and will include new features and more noise sources: a second PN junction and a jitter-based noise generator. This device improves the entropy of the Linux system used by clients, improving the cryptographic operations. Companies, often have Virtual Private Networks (VPNs), which employees can use when are outside of the company. These not only provide an isolation layer, but also access to internal services. However, this means that communication between employees will always go through a central location, making all communication easier to obtain. This happens because only the Internet link to the location of the VPN server needs to be tapped. In order to avoid this, a multipoint VPN is used. The technology used is Dynamic Multipoint Virtual Private Network (DMVPN). With a multipoint VPN, the VPN clients communicate directly with each other. The operating system used for the clients is Tails Linux. Because Tails Linux always boots from a clean state, a bootstrap software was created to allow easy deployment of the multipoint VPN and random number generator software. Testing results of the random number generator obtained from the tools Ent and rngtest show good performance, favoring the dual PN junction without filtering setting. Throughput tests shown that the throughput of the jitter-based noise generator is significantly lower than the throughput of the PN junction noise generators, diminishing its usefulness as a suitable noise generator. Tests of the bootstrap software shown that the deployment of the multipoint VPN and random number generator software is not only possible, but easy when the software created is used. It is possible to conclude that the scenario proposed is valid and both random number generator and multipoint VPN integrate well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

پیش‌بینی ارتباط جنسی بر اساس سبک‌های دلبستگی و خودتمایزیافتگی دانشجویان زن متأهل

Purpose: This study was done to predict sexual communication based on attachment style and differentiation of self in married female students of Universities in city of Ahvaz. The 220 participants were selected through accessible sampling. Methods: The participants completed Wheeless & Baus Sexual Communication Scale (1984), Simpson Adult Attachment Scale Questionnaire (2003), and Differentiati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015