logo

Information Security Question Answer 2022

6 Pages875 Words10 Views
   

Added on  2022-10-11

Information Security Question Answer 2022

   Added on 2022-10-11

ShareRelated Documents
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note
Information Security   Question Answer 2022_1
1INFORMATION SECURITY
Answer to question1:
A cryptosystems is an execution of the methods of cryptography and the infrastructure
in order to give services of information security. A cryptosystem is also known as a cipher
system (Simmons, 2019).
The cryptosystems are used to provide confidentiality, integrity and non-repudiation
to the information systems or the information that are stored in the information systems.
Confidentiality:
Confidentiality is a concept of making sure that the data is not made available to the
people that are not authorized. Confidentiality is established by encryption. Both the
asymmetric and symmetric encryption is used for confidentiality (Thillaiarasu et al.,2018).
The data confidentiality is achieved through algorithms of encryption that are strong and that
cannot be broken easily. A spy ring that is secret and doing substitution of character that is
simple is not a strong encryption. Confidentiality is essential when the communications of
network are of sensitive nature such as the secrets of trade, information of the client or the
strategies of business. The confidentiality is also essential for essential data that is at rest. The
procedure of encryption in transparent to the user.
Integrity:
Integrity of information is the protection of information from being changed by the
parties that are unauthorized. As with the confidentiality of data, cryptography plays an
important role in making sure the integrity of data. The methods that are used commonly in
order to protect the integrity of data consist of data hashing and then comparing it with the
hash of the message that was received originally. This means that the hash of the data that is
original must be given to the user in a fashion that is more secured. The techniques that are
Information Security   Question Answer 2022_2
2INFORMATION SECURITY
convenient those are to be used in the schemes that already exist are GPG in order to sign the
data digitally.
Non –repudiation
From the view of security of information, non-repudiation applies to the cases of
contract that are formal, data transfer or communication (Badra & Borghol, 2018). Its goal is
to make sure that a person or an organization is bound by the contract terms or the parties that
are involved in a specific communication or transfer of documents are not able to deny the
authenticity of the signatures on the documents of contract.
It is done using digital signatures in the cryptosystems. In this method, a certificate
authority that is trusted signs each of the certificates. ‘
Answer to question2:
A common attack on the cryptographic systems is the brute force attack.
The attack that is simplest on a cipher is the attack of brute force. In the attack of
brute force, the attacker tries to decrypt the message with the secret key that is possible and
then check the output of the decryption (Arzhakov & Silnov, 2016). Enough time and the
resources those are computational are given, this attack guarantees to work as the secret key
that is true should be within the set of secret keys that are possible and the attacker will try
and understand that the plaintext is the correct one.
The ciphers that are modern protect themselves against the attack of brute force using
a key that is secret and that is enough long in order to make guessing of the possibilities
impossible. Example: The longest length of key that is available of the cipher of AES is 256
bits that means there are 2256 keys of AES are possible.
Information Security   Question Answer 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Techniques Assignment 2022
|9
|2287
|7

Cryptography: Basic Concepts and Its Importance in Network and Web Security
|13
|3502
|242

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits
|10
|2275
|404

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Exchanging of Keys Between the Two Parties in a Communication
|5
|1820
|81

RSA ALGORITHM Name of the University Author Note RSA ALGORITHM Name of the Student Name of the University Author Note RSA ALGORITHM RSA ALGORITHM Name of the Author of the University
|3
|472
|239