This report discusses various approaches to cryptography like secret-key cryptography, public-key cryptography, digital signature, digital certificates, and authentication. It also explores recent developments in cryptography technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SYSTEM SECURITY SYSTEM SECURITY Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SYSTEM SECURITY Table of Contents Introduction..........................................................................................................................2 Discussion............................................................................................................................2 Approach to Cryptography..............................................................................................2 Secret- Key Cryptography...........................................................................................2 Public- Key Cryptography...........................................................................................3 Digital Signature..........................................................................................................3 Digital Certificates.......................................................................................................4 Authentication..............................................................................................................4 Development in Cryptography........................................................................................4 Conclusion...........................................................................................................................5 References............................................................................................................................5
2SYSTEM SECURITY Introduction Cryptography is mainly associated with the method of changing ordinary text into unintelligible text (Suveetha and Manju 2016). This method is mainly related to storing and transmission of data in the given form. Cryptography is not only related to protection of data but is also related to user authentication. It aims in providing secure and better communication even in the presence of third-party communication which are called as adversaries. Encryption makes use of proper algorithm and key transforming for the given input into the encrypted output (Hynes, Cheng and Song 2018). Algorithm is considered to be secured in nature if the attackers cannot easily check any of the given property of plain text. The attacker should not be able to gain knowledge about a large number of plaintext for which keys are used. In the upcoming pages, various approach to cryptography has been discussed in details. The last section of the report mainly deals with recent development in Cryptography. Discussion Approach to Cryptography Secret- Key Cryptography In encryption system both the receiver and transmitter of the message comes up with single and common key (Sasi and Sivanandam 2015). It is mainly used for encrypting and decrypting the messages. It can contrast with some of the public key cryptography that uses two keys that is public key and another one is private key. Symmetric key is considered to be much simple and faster which comes up with many drawbacks. It provides the method by which two given parties can easily interchange the key in more secure and better way. Public encryption can easily avoid this issue as it can be check the distributed in much secure way. Generally, private
3SYSTEM SECURITY key can never be transmitted or given in much secure way. In this method, both sender and receiver aim to share a single key. Sender makes use of this particular key for plaintext and cipher text to the message receiver (Mei, Chen and Huan 2016). On the other side, the receiver aims to apply some kind of key for decryption of message and recovering the given plain text. Public- Key Cryptography Public key encryption is a well-known encryption technique which make use of paired of public and private key algorithm which is needed for securing communication (Tao and Dubrova 2016). The sender of the message makes use of recipient for understanding the public key for encrypting the message. For decryption of the sender message, only recipient private is used for this. There are mainly two types of PKC algorithm that are RSA (Rivest, Shamir, and Adelman) and DSA (Digital Signature Algorithm). PKC algorithm mainly focuses on meeting growing secure communication which depends on various sectors and industry like military. In the last 300-400 years, it is considered to be as one of revolutionary idea (Wu et al. 2016). The public key in model is freely distributed when it is paired with private key. The given public key is mainly used for two purpose that is encryption and decryption. Digital Signature Digital signature is considered to be public key primitives of the given message based authentication (Adhie et al. 2018). In the present world, it is commonly handwritten signature or even typed messages. It needed for binding signature to the given message. A digital signature is a good technique which is needed for binding persons and entity to the provided digital data. The given binding can be easily received by the third party. Digital signature comes up with cryptographic value which is estimated from data and secret key. The receiver of the message requires proper assurance for understanding the message which belongs to the sender. The fact
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4SYSTEM SECURITY should be taken into consideration that originality of the message is not repudiated (Hynes, Cheng and Song 2018). This particular factor is considered to be an important factor as it comes up with high value of exchanged data. Digital Certificates A digital certificate-based authentication for web-based credentials which is used for sender and understand the encrypted message in the form data form given trusted source. With the help of digital certificates, consumers and business can easily security application for public key infrastructure (Suveetha and Manju 2016). PKI comes up with technology which is needed for securing both e-commerce and internet-based sources. Number of people and business in online platform is increasing at much rapid rate. So, as a result, the access is becoming much faster and cheaper in nature. Authentication Authentication method is all about understanding and verifying the identity of the user. The whole given mechanism is all about understanding the request and verifying credentials. The credential is compared to file in the database system of the authorized user (Cao et al. 2016). Authentication process mainly works at the beginning of the application before any code is allowed to execute. Various type of system requires different type of credential which is needed for understanding the user identity. Credential mainly takes in the form of the given password which is known to be secret in nature (Tao and Dubrova 2016). Authentication comes up with two phases like identification and authentication. Identification phase mainly aims to provide user identity to the given system.
5SYSTEM SECURITY Development in Cryptography Cryptographytendstoplayakeyrolewhichcanrangefrome-mailtocellular communication (Sasi and Sivanandam 2015). This particular technology can be considered to be an important part of information system in the upcoming years. Cryptography technology aims to provide a wide range of technology which can range accuracy and confidentiality. This particular technology can prevent fraud and validation of financial transaction. Cryptography can easily the web pages and prevent any kind of industrial competition. In the coming years, this technology will become vital as the communication has totally moved to system based networks. Conclusion The above pages of the report mainly deals with cryptography technology. In the above pages of the report, various kind of cryptographic technology like public key cryptography, secret key cryptography, digital signature, digital certificates, and authentication has been discussed in details. After that various kind of development in cryptography method has been provided in brief.
6SYSTEM SECURITY References Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018, January. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). InJournal of Physics: Conference Series(Vol. 954, No. 1, p. 012009). IOP Publishing. Cao, X., Zhang, J., Fu, L., Wu, W. and Wang, X., 2016. Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks.IEEE/ACM Transactions on Networking (TON),24(2), pp.1139-1152. Hynes, N., Cheng, R. and Song, D., 2018. Efficient deep learning on multi-source private data.arXiv preprint arXiv:1807.06689. Mei, W., Chen, Z. and Huang, C., 2016, May. Robust artificial-noise aided transmit design for multi-user MISO systems with integrated services. InICASSP(pp. 3856-3860). Sasi, S.B. and Sivanandam, N., 2015. A survey on cryptography using optimization algorithms in WSNs.Indian Journal of Science and Technology,8(3), pp.216-221. Suveetha, K. and Manju, T., 2016. Ensuring confidentiality of cloud data using homomorphic encryption.Indian Journal of Science and Technology,9(8). Tao, S. and Dubrova, E., 2016. Ultra-energy-efficient temperature-stable physical unclonable function in 65 nm CMOS.Electronics Letters,52(10), pp.805-806. Wu, Y., Schober, R., Ng, D.W.K., Xiao, C. and Caire, G., 2016. Secure massive MIMO transmission with an active eavesdropper.IEEE Transactions on Information Theory,62(7), pp.3880-3900.