02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Applications of Cryptography 73<br />

1. Click Start ➢ All Programs ➢ Administrative Tools ➢ Local Security Policy.<br />

2. Select the Local Computer node ➢ IP Security Policies, and in the right pane right-click<br />

the Secure21 policy and click Assign.<br />

On Computer B:<br />

1. In the Local Security Policy Microsoft Management Console (MMC) console, on the<br />

Local Computer node right-click IP Security Policies, select All Tasks, and then click<br />

Export Policies.<br />

2. In the Save As dialog box, type C:\IPSecPolicy\IPsecurityPolicy21.ipsec, and then click<br />

Save. You must then save the IPSec policy.<br />

Import the security policy to a Windows machine.<br />

Next, configure a Security Association rule in the Windows Firewall with Advanced<br />

Security MMC:<br />

1. On Computer A, click Start ➢ Administrative Tools ➢ Windows Firewall With<br />

Advanced Security.<br />

2. Select and then right-click Connection Security Rules, and then click New Rule.<br />

3. In the New Connection Security Rule Wizard, select Server-To-Server, and then click<br />

Next.<br />

4. On the Endpoints screen, select Any IP Address for both options, and then click Next.<br />

5. On the Requirements screen, select Require Authentication For Inbound And Outbound<br />

Connections, and then click Next.<br />

6. On the Authentication Method screen, select Preshared Key, type password in the text<br />

box, and then click Next.<br />

7. On the Profile screen, verify that the Domain, Private, and Public options are selected,<br />

and then click Next.<br />

8. In the Name text box, type Secure Server Authentication Rule, and then click Finish.<br />

9. Perform steps 1–8 on Computer B.<br />

Pretty Good Privacy<br />

Pretty Good Privacy (PGP) is another application of cryptographic technologies. Using public<br />

key encryption, PGP is one of the most widely recognized cryptosystems in the world.<br />

PGP has been used to protect the privacy of e-mail, data, data storage, and other forms of<br />

communication such as instant messaging.<br />

Early versions of PGP were written by its creator Philip Zimmermann and<br />

first offered to the public in 1991. The program is one example of an open<br />

source application and as such has several different versions available,<br />

with everyone having an opinion about which is best.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!