📄 vpnlecture.html
字号:
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the above scenario is simply
called</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> damn mad ppl are awake for this
lecture, lol</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> symetric encryption</P>
<P style="MARGIN-BOTTOM: 0cm">--> PhrostByte
(PhrostByte@RlNKlHrtD4k.socal.rr.com) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> there is also</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> aysmetric encryption( w/o
symetry)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> which i will describe later</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> another term is cipher text , this
is the data being encrypted</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Encrytipon is the act of
transforming clear text into cipher text</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> normally a key has to be provided
along w/ the cipher textt</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> this is a simple formula those
describles the encrytion processs</P>
<P style="MARGIN-BOTTOM: 0cm"><-- PhrostByte
(PhrostByte@RlNKlHrtD4k.socal.rr.com) has left #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm">--> PhrostByte
(PhrostByte@RlNKlHrtD4k.socal.rr.com) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ciphertext= f (clear-text, K1)</P>
<P style="MARGIN-BOTTOM: 0cm">>Mikkkeee< whats up</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> whereis f=algorithm,K=Key </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> so</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> suppose you had the word</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> fag</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> whoops</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i should be PC</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the word toy</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> toy =clear-text</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> algorithm will be add 3 letters to
each letter</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> whoops</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> algorithm is addletters</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> while</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the Key is add 3 letters</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> so</P>
<P style="MARGIN-BOTTOM: 0cm"><-- linuxlogic has quit (Ping timeout: 180
seconds)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> cipher= add-letters( toy , 3)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> result would be</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> wrb= addletters( toy, 3)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> decryption would do the
oppositte</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> removeletters( wrb ,3) = toy</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> simple eh</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ok</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> definition </P>
<P style="MARGIN-BOTTOM: 0cm"><-- Phaedrus has quit (Read error: 104
(Connection reset by peer))</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> for decryption</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> is</P>
<P style="MARGIN-BOTTOM: 0cm">--> Phaedrus (bar@PSBfMieMHWU.128.164.62.O) has
joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><-- Zomart has quit ()</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the process of taking the cipher
text and translating it into clear text..... ( btw this requires a key also)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> what i describe above</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> is a bloated ex. of symentic
encrption</P>
<P style="MARGIN-BOTTOM: 0cm"><-- syme_ has quit (Argh! Learn how to fucking
spell or piss off and die.)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> since there are 56 bit</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> bits</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> there are 2^56 possible keys</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> or</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> about 72x10^12 keys</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> MIT says</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> an average dude with 400 bucks
would take 38 years to crack regular des encrption</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> however US Governemnt with
300million takes 12 seconds</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> so</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> an alternate DES was
developped</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> where</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the data is Encrypted with Key1
then decrypted with Key2 and reecrpted with Key1</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> thus make the totaol key size to
56x2</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> theres even another type of
DES</P>
<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee sets mode +R #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> called 3des where 3 different Keys
are involved</P>
<P style="MARGIN-BOTTOM: 0cm"><Chris> --- Chris sets mode +R Chris</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> K1 encrypts, k2 decrpts,k3
encryps</P>
<P style="MARGIN-BOTTOM: 0cm"><Chris> ;)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and the process is reversed on the
decryption end</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> thers another type of encrption
called Asymetric .. but i'll first take questions again</P>
<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode -m #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><simprix> any questions</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ha</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i dont think anybody is
listening</P>
<P style="MARGIN-BOTTOM: 0cm">* Lunarcade stirs</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> damn place is packed</P>
<P style="MARGIN-BOTTOM: 0cm"><b0ttyburp> we are listening</P>
<P style="MARGIN-BOTTOM: 0cm">--> SpiderMan (SpiderMan@NIZ2cxYsTpo.o1.com)
has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm">--- ChanServ gives channel operator status to
SpiderMan</P>
<P style="MARGIN-BOTTOM: 0cm"><simprix> im listening</P>
<P style="MARGIN-BOTTOM: 0cm"><b0ttyburp> *we are</P>
<P style="MARGIN-BOTTOM: 0cm"><snidx2> listening</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> sup spider</P>
<P style="MARGIN-BOTTOM: 0cm"><SpiderMan> hey</P>
<P style="MARGIN-BOTTOM: 0cm"><LiquidCrystalDismay> watching</P>
<P style="MARGIN-BOTTOM: 0cm"><simprix> you are just explaining ut very
well</P>
<P style="MARGIN-BOTTOM: 0cm"><b0ttyburp> i can say WE cos we have a royal
family :O)</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> ;)</P>
<P style="MARGIN-BOTTOM: 0cm">* Phaedrus is more reading than anything</P>
<P style="MARGIN-BOTTOM: 0cm"><b0ttyburp> simprix: ur correct</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> lemme just finish up then</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> wityh asymetric encryption</P>
<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode +m #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><-- ldh1 has quit (Your explaining it horribly.
I'm scarred for ever.)</P>
<P style="MARGIN-BOTTOM: 0cm">--> [RaFa] (~none@bbmaCUCLI54Y.wantstofuck.us)
has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> my fingers are terrible tired from
typing</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> sup rafa</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Asymmetric involves a public and a
private key</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> its typically used for
authentication</P>
<P style="MARGIN-BOTTOM: 0cm"><Mikkkeee> ;)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> b/c of the high packet payload
(due to a lot of keys) it doesnt provide an efficient method of data transport
for time</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> critical data</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> this type is 3des</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> where 3 diff. keys are used</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> it relies on complex mathamatical
algorithms that mainly depend on large prime numbers....</P>
<P style="MARGIN-BOTTOM: 0cm">--> trinity (mec@sV6ppNXc5Bss.203.197.150.O)
has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the encryption processs is simliar
in equation for tot that of symetric encryption</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> where</P>
<P style="MARGIN-BOTTOM: 0cm"><-- phatal has quit (Ping timeout: 180
seconds)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Encryption = ciphertext=
shift-right ( clear-text , 3)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> but the</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> decryption uses a different
relation similar to</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> decryptions = cleartext=
shift-right (cipher-text, -3)</P>
<P style="MARGIN-BOTTOM: 0cm">* Chris is away: brb</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the relations ship between key 1
and key 2 is K1= (-1)K2</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> as with symmetric K1=k2</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ok</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> now when deploying VPN</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> keep in mind</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> what sorta encryption algorithm
you are going to impart in ur VPN</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> if you are on a slow WAN link</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> you probably want to limit ur
asymetric encryption to just authentication</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> then transfer private keys for
symetric encryption</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> however</P>
<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee gives channel operator status to
[RaFa]</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> well</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> one sec</P>
<P style="MARGIN-BOTTOM: 0cm">--> phatal
(phatal@Ta5W3Z8Rgg6.bhm.bellsouth.net) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> my bad silly cat</P>
<P style="MARGIN-BOTTOM: 0cm">--> bluhayz
(bluhayz@fbbjxw4qW6zo.nv.nv.cox.net) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ok symetric is more efficient
primarly b/c its smaller pay load</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> key size is small</P>
<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee gives channel operator status to
bluhayz</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> thus its more efficient for bulk
transfers </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and for slow wan links</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Aysmetric is exacly the
opposite</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> oh yea</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> CBC</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> outer-cipher block chaining is
used in VPN packets</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> to input spoiler data in the
packet</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> so that repetative data does
become pattern encrypted</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> like someone is using a
website</P>
<P style="MARGIN-BOTTOM: 0cm"><-- snidx2 has quit ()</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the pass is resent over and over
each time they view anothe rpage in that secure domain</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> well thats it</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> :-D</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i know i prolly went into
encryption to much</P>
<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode -m #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><bluhayz> it's over?</P>
<P style="MARGIN-BOTTOM: 0cm">* b0ttyburp clap "" clap """ clap """ :O)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> but its important for
understanding the transfer of VPN data</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> hehe</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> if you wanna put it all
together</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> you can</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i'm so tired from typing</P>
<P style="MARGIN-BOTTOM: 0cm"><Phaedrus&g
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -