logo

Cryptographic Techniques

   

Added on  2022-12-30

6 Pages2878 Words62 Views
Cryptographic Techniques
Name of Student
Name of University
Author’s Note
Cryptographic Techniques_1
2
Table of Contents
INTRODUCTION..............................................................................................................................................2
OVERVIEW OF THE TECHNOLOGY INVOLVED......................................................................................2
APPLICATIONS OF THESE TECHNOLOGIES............................................................................................2
CHALLENGES IN THE RESEARCH AREA..................................................................................................3
GAPS IN THE LITERATURE..........................................................................................................................3
SUMMARY OF FUTURE RESEARCH DIRECTIONS..................................................................................3
Cryptographic Techniques_2
3
Cryptographic Techniques
ABSTRACT Cryptography is required for
security as well as integrity of data which is
stored into the cloud. In the paper, cryptographic
techniques in the computer networks are being
reviewed. The techniques are used to protect
integrity of data. The major threats in the
computer network communications are being
outlined. Growth of the outsourced storage in
form of the storage service providers will
underline importance of developing effective
security mechanisms for protection of data stored
into the network storage system. In this paper,
three types of cryptographic techniques are
discussed. Symmetric key cryptographic is the
technique where both sender as well as receiver
can share single key. The sender can use key to
encrypt plaintext as well as send cipher text to
receiver. Public key cryptographic technique is
related to using two keys where public key is
freely distributed and paired private key remains
secret. In hash functions, no key is used into
algorithm. Specific cryptographic techniques are
accessible to protect of data in different
applications. The techniques are required for
data confidentiality of saved data. Use of
cryptography into cloud will enable to secure
data. The purpose of selecting this research
topic is that cryptography is linked with process
to convert ordinary plain text in unintelligible
text along with vice versa. Cryptography
techniques not only protect the data from theft
but it is used for authentication of users. This
paper presents overview of the cryptographic
techniques and security challenges related to the
public cloud computing.
Keywords Cloud computing, security challenges,
cryptographic techniques, symmetric key cryptographic,
hash functions, public key cryptographic
INTRODUCTION
Cryptography can be considered as one of the most
important technologies that is used in the process of building a
secured VPN. Various applications of similar and basic
algorithms could provide encryption that keeps the data secret
as well as authenticate and hence ensures the security of two
peers in a particular VPN are the individuals which they claim
they are [1]. This particular assignment describes regarding the
concept of cryptography techniques, it also discusses regarding
the overview of the technology that is involved, and application
of these technologies [2]. This assignment discusses the
challenges in this particular research area and gaps in the
literature.
OVERVIEW OF THE TECHNOLOGY INVOLVED
The technologies that are involved in the
process of cryptography are as follows
Symmetric ciphers: symmetric ciphers tend to
employ the same keys for the purpose of
encrypting the plain text and for decrypting the
cipher text. In this technique, the senders as well
as receivers should agree on this particular key,
this key should also not be known to anyone else
other than the participants of the technique [3].
The strength of the symmetric algorithms in a
cryptographic technique might be gauged by the
size of key employs. The examples of this
particular technique include.
Asymmetric ciphers: asymmetric ciphers have a
great advantage of the fact that a particular
shared secret key do not usually needs to be
exchanged over a particular medium that is
insecure in nature, like public internet [4]. A
particular key is supposed to be nominated as a
public key and it is published. In this particular
technique, could be accompanied with the help of
knowing the second private key which the sender
would ensure that it has never been released.
APPLICATIONS OF THESE TECHNOLOGIES
In the process of symmetric encryption, the
users use the same key for the purpose of
carrying out both the encryption as well as
decryption of message or data [5]. Suppose a
particular message needs to be sent to another
user but the sender does not want the message to
be revealed. Taking this example into
consideration, both the users need to have a same
key for the purpose of encrypting as well as
decrypting the message which the users would
exchange with one another [6]. Asymmetric
encryption is considered as the opposite to
symmetric encryption. This is because, this
strategy makes use of two keys instead of one
key, one key is known to be private and another
one is known to be public key. In this particular
strategy, the private key is private in nature and it
I supposed to b kept private, this key is used for
the purpose of decryption of the message, the
message has been encrypted with the help of
pub7ic key [7]. Public key does not require any
security, this is because it should be available ad
could be passed over the internet.
One more application of cryptographic
technologies includes quantum cryptography.
Quantum cryptography can be defined as a
particular attempt that allows users for
communicating with the usage of methods that
are ore secured in nature [8]. These methods are
nit similar to the ones that are guaranteed by the
traditional cryptography. Previously the security of
cryptography had been dependent on
mathematics and hence took into account various
computation powers that are limited in nature.
These computation powers have been developed
by various researchers [9]. Breaking a particular
code of cryptography has the chance to involve
factoring large numbers to prime numbers; its
length is usually over 100 digits that have been
assumed to be not possible in a particular
reasonable amount of the time. It is applicable
Cryptographic Techniques_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CRYPTOGRAPHIC TECHNIQUES.
|3
|398
|59

Introduction to Cryptography and Security Mechanisms
|33
|5553
|256

Encryption Symmetric Key Encryption
|9
|2853
|351

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Cryptography Algorithm
|11
|2443
|35

Overview of Network Security
|5
|775
|62