3COMPUTER SECURITY ENGINEERINGTopic 3 EncryptionSymmetric key encryptionThe encryption process in the recent time is playing a very vital role in every sphere. Themessage which is send from one person to another have to be secured and has to be seen that it isnot in hand of nay user expect the actual recipient of the message. In Symmetric key encryptioneach of the computer system has a secret key. The secret key can be used to encrypt a packet ofinformation mainly with the main propose of protecting it from other users before it is send overthe network to another computer system (Goyal, Koppula & Waters, 2017). In the process ofsending message with the indicated encryption process it is very important to know the computerwhich is going to interact with in order to install the key. The drawback aspect of the process isthat the transfer of key is very much important and it has to be seen that the key does not reachanyone else than the intended recipient. Symmetric key is very similar to secret code that each ofthe two computers which are interacting must know in order to complete the communicationprocess (Prajapat & Thakur, 2016). In Symmetric key encryption each of the computer systemhas a secret key is can be considered as the most important and the most beneficial aspect of theencryption technology related to Symmetric key encryption process.Public key encryptionThe public encryption can be referred to as a system of cryptography that mainly consistsof two keys – a public key and the private or the secret key. The public key is basically known toeveryone and on the other hand the private and the secret key are known only to the intended enduser of the message. The main aspect in this cryptographic function is that the two keys arerelated in a way that only the public key can be used to encrypt the message and only the
4COMPUTER SECURITY ENGINEERINGcorresponding private key which is related to the public key can be used to encrypt the messagefrom the recipients side (Bellare, Kane & Rogaway, 2016). The security aspect involved in thetechnology is that it is virtually impossible to generate the private key if some user knows thepublic key. From the hackers point of view it is generation of the private is a hard job at hand, sothe message is transferred in a secured manner.HashingThe hashing function is almost available in all application which is related to theinformation system (Waters, 2016). The technology is very much important from the users pointof view with the security aspect related to the internet and the communication medium. The hashfunction is mainly a mathematical function which is used to convert an input value which isnumerical and convert it into a numerical value which would be compressed. The value which isreturned by the hash function is termed as message digest or in order words hash value.Technique Used For Confidentiality and AuthenticationHashing is the most popular implementation of the cryptography which uses differentaspect of security which can directly insure Confidentiality and authentication (Koppula et al.,2017). In computer security aspect the term confidentiality and the authentication play a veryvital role. Everybody who access the network want their data to be secured and no one expect theintended person would not get access to the data stored in the server or over the network. Thereare two direct application of the hash function which is based on cryptographic property.1. Password Storage
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss