Documente Academic
Documente Profesional
Documente Cultură
Source Address:
- Source address consists of 6-bytes(48-bits)
- It contains the physical address of the sender of the packet
TYPE/LENGTH:
- Length is a 2-Byte field, which indicates the length of
entire Ethernet frame
- This 16-bit field can hold the length value between 0 to
65534
- Values of 1500 and below mean that it is used to indicate
the size of the payload in bytes
- But length cannot be larger than 1500 because of some
own limitations of Ethernet
Data:
- This is the place where actual data is inserted, also known
as Payload
- Both IP header and data will be inserted here if Internet
Protocol is used over Ethernet
- The minimum data length can be of 46-bytes and
maximum of 1500-bytes
- In case data length is less than 46-bytes then 0’s padding
is added to meet the minimum length
FCS:
- FCS is 4 Byte field. This field contains a 32-bits hash code
of data, which is generated over the Destination Address, Source
Address, Length, and Data field
- If the sum computed by destination is not the same as
sent sum value, data received is corrupted
Interpacket Gap:
- Is idle time between packets. After a packet has been
sent, transmitters needs to transmit a minimum of 96 bits of idle line
state before transmitting the next packet
It is used for building a LAN.
The basic idea of its design is that multiple computers have access to
it and can send data at any time
RSA was first publicly described in 1977 by Ron Rivest, Adi Shamir
and Leonard Adleman
In RSA cryptography, both the public and the private keys can encrypt
a message; the opposite key from the one used to encrypt a message
is used to decrypt it.
The public key can be shared with everyone, whereas the private
key must be kept secret.
Plaintext: the original message
Cipher text: the transformed message
Encryption: The process of converting plaintext to cipher text
Decryption: The process of converting cipher text back into plaintext
Encrypting message
Alice gives her public key (n & e) to Bob and keeps her private key secret.
Bob wants to send message Hello to Alice.
First he turns Hello into a number m smaller than n.
Decrypting message
Alice can recover m from c by using her private key d by m= c^d mod n
The keys for the RSA algorithm are generated the following way:
Choose two different large random prime numbers p and q
Calculate n= pq
N is the modulus for the public key and the private keys