16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Standardizing <strong>Security</strong> 249<br />

is established, the HTTP server will perform password authentication as normal, but in<br />

this case, the username and password will not be sent as plaintext over the network. As a<br />

result, the authentication is secure.<br />

The last two security technologies we will mention are secure FTP (FTP over SSL) and<br />

PGP. 5 Secure FTP (not to be confused with SFTP, the Simple File Transfer Protocol), is<br />

simply the implementation of FTP over an SSL connection. It will behave in the same<br />

manner as FTP, but the information being transmitted will be encrypted. Quite different<br />

from Secure FTP, PGP is an overloaded name—it refers to a product, a company, and<br />

a technology. Originally written in the early 1990s, PGP started out as a program to<br />

secure emails using public-key cryptography (it used its own algorithm). Still in use<br />

today, PGP is provided in commercial products that provide various levels of security<br />

and authentication. The commercial products are targeted at specific platforms, but<br />

the original technology could be adapted to an embedded application. This would, of<br />

course, require you to obtain the source code for the old PGP technology, which is likely<br />

protected by copyright, but it would be an interesting project to see if it could be ported<br />

to an embedded system—encrypted email could be a useful feature in many embedded<br />

applications.<br />

10.5.4 Wrap-Up<br />

We have only scratched the surface of security protocols in this chapter, but it should be<br />

enough to get started. In the next chapter, we cover a single protocol in more depth, since<br />

it is so important to security in general. This protocol is used in virtually every secure<br />

Web transaction today: the Secure Sockets Layer (SSL).<br />

5 PGP is a trademark of the PGP Corporation.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!