logo

Cryptography and Security: A Comprehensive Analysis of DES and AES

   

Added on  2024-05-20

13 Pages2275 Words71 Views
 | 
 | 
 | 
CSC8419
Cryptography and Security
Cryptography and Security: A Comprehensive Analysis of DES and AES_1

Table of Contents
Task 1.........................................................................................................................................2
Task 2- 5 general design decisions that have to be made while constructing secure systems...4
Task 3.........................................................................................................................................6
Task 4.........................................................................................................................................7
Task 5.........................................................................................................................................9
References................................................................................................................................12
1
Cryptography and Security: A Comprehensive Analysis of DES and AES_2

Task 1
Computer systems provide various technological advantages over the traditional technology.
With the boom of the internet technology, its reach is limitless. The main concerns come in
terms of the security and protection of the data communication. The CIA (Confidentiality,
Integrity and Availability) also some time known as the CIA Triads is design to tackle this
type of issues. The CIA is the model which is designed to tackle the issues of the security
policies within the organization. The CIA sometimes are also called as AIC triad to avoid
confusion with the USA CIA agency.
All the three terms are the crucial pillars of the security in terms of security for data
communication. Confidentiality restricts the access to the crucial information. Integrity
ensures that the information is secure and has not been tempered. And the last reliability
guarantee that the information access is available the to the right person (Henderson, 2015).
Figure 1 The CIA Triad
Confidentiality
The confidentiality can also be comparable to the privacy. There are necessary steps taken to
ensure that the privacy or confidentiality of data will be maintained. It will prevent the
sensitive information getting into the wrong hands. There are various security policies and
technology will be used to maintain this processes continuously in the production network
environment.
2
Cryptography and Security: A Comprehensive Analysis of DES and AES_3

Integrity
The integrity is mainly responsible for the data accuracy, consistency and worthiness of the
critical information over a specific period of time. And the information data must not be
altered or changed during the transmission over the network lines. There are various policies
and controls will be involved to ensure the data integrity. And these are controlled by various
hardware and software resources to ensure it.
Availability
The availability is the key pillar of the security policies. Because of the data is not available
at the right time for the right user then it will be of no use. This is done by regular monitoring
of the hardware and software resources. And the system will be updated and patched on the
timely basis, so the service and data availability can be guaranteed to the end user without
any interruptions (Chai, 2012).
3
Cryptography and Security: A Comprehensive Analysis of DES and AES_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: CIA Triad, ATM Security, Biometric Authentication, Caesar Cipher
|13
|2577
|292

CSC8419 - Cryptography and Security: Assignment 1
|8
|2184
|78

Analysis of Information Security Technologies
|7
|1186
|223

Cyber Security in Practice
|10
|3837
|96

CSC8419: Cryptography and Security - Assessment 1
|10
|2228
|410

CIA Model Analysis: Strengths, Weaknesses, and Comparison with Other Models
|12
|3813
|70