Cryptography and System Security .
VerifiedAdded on 2023/05/28
|7
|1528
|232
AI Summary
This report discusses various approaches to cryptography like secret-key cryptography, public-key cryptography, digital signature, digital certificates, and authentication. It also explores recent developments in cryptography technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SYSTEM SECURITY
SYSTEM SECURITY
Name of the Student
Name of the University
Author Note:
SYSTEM SECURITY
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SYSTEM SECURITY
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Approach to Cryptography..............................................................................................2
Secret- Key Cryptography...........................................................................................2
Public- Key Cryptography...........................................................................................3
Digital Signature..........................................................................................................3
Digital Certificates.......................................................................................................4
Authentication..............................................................................................................4
Development in Cryptography........................................................................................4
Conclusion...........................................................................................................................5
References............................................................................................................................5
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Approach to Cryptography..............................................................................................2
Secret- Key Cryptography...........................................................................................2
Public- Key Cryptography...........................................................................................3
Digital Signature..........................................................................................................3
Digital Certificates.......................................................................................................4
Authentication..............................................................................................................4
Development in Cryptography........................................................................................4
Conclusion...........................................................................................................................5
References............................................................................................................................5
2SYSTEM SECURITY
Introduction
Cryptography is mainly associated with the method of changing ordinary text into
unintelligible text (Suveetha and Manju 2016). This method is mainly related to storing and
transmission of data in the given form. Cryptography is not only related to protection of data but
is also related to user authentication. It aims in providing secure and better communication even
in the presence of third-party communication which are called as adversaries. Encryption makes
use of proper algorithm and key transforming for the given input into the encrypted output
(Hynes, Cheng and Song 2018). Algorithm is considered to be secured in nature if the attackers
cannot easily check any of the given property of plain text. The attacker should not be able to
gain knowledge about a large number of plaintext for which keys are used.
In the upcoming pages, various approach to cryptography has been discussed in details.
The last section of the report mainly deals with recent development in Cryptography.
Discussion
Approach to Cryptography
Secret- Key Cryptography
In encryption system both the receiver and transmitter of the message comes up with
single and common key (Sasi and Sivanandam 2015). It is mainly used for encrypting and
decrypting the messages. It can contrast with some of the public key cryptography that uses two
keys that is public key and another one is private key. Symmetric key is considered to be much
simple and faster which comes up with many drawbacks. It provides the method by which two
given parties can easily interchange the key in more secure and better way. Public encryption can
easily avoid this issue as it can be check the distributed in much secure way. Generally, private
Introduction
Cryptography is mainly associated with the method of changing ordinary text into
unintelligible text (Suveetha and Manju 2016). This method is mainly related to storing and
transmission of data in the given form. Cryptography is not only related to protection of data but
is also related to user authentication. It aims in providing secure and better communication even
in the presence of third-party communication which are called as adversaries. Encryption makes
use of proper algorithm and key transforming for the given input into the encrypted output
(Hynes, Cheng and Song 2018). Algorithm is considered to be secured in nature if the attackers
cannot easily check any of the given property of plain text. The attacker should not be able to
gain knowledge about a large number of plaintext for which keys are used.
In the upcoming pages, various approach to cryptography has been discussed in details.
The last section of the report mainly deals with recent development in Cryptography.
Discussion
Approach to Cryptography
Secret- Key Cryptography
In encryption system both the receiver and transmitter of the message comes up with
single and common key (Sasi and Sivanandam 2015). It is mainly used for encrypting and
decrypting the messages. It can contrast with some of the public key cryptography that uses two
keys that is public key and another one is private key. Symmetric key is considered to be much
simple and faster which comes up with many drawbacks. It provides the method by which two
given parties can easily interchange the key in more secure and better way. Public encryption can
easily avoid this issue as it can be check the distributed in much secure way. Generally, private
3SYSTEM SECURITY
key can never be transmitted or given in much secure way. In this method, both sender and
receiver aim to share a single key. Sender makes use of this particular key for plaintext and
cipher text to the message receiver (Mei, Chen and Huan 2016). On the other side, the receiver
aims to apply some kind of key for decryption of message and recovering the given plain text.
Public- Key Cryptography
Public key encryption is a well-known encryption technique which make use of paired of
public and private key algorithm which is needed for securing communication (Tao and Dubrova
2016). The sender of the message makes use of recipient for understanding the public key for
encrypting the message. For decryption of the sender message, only recipient private is used for
this. There are mainly two types of PKC algorithm that are RSA (Rivest, Shamir, and Adelman)
and DSA (Digital Signature Algorithm). PKC algorithm mainly focuses on meeting growing
secure communication which depends on various sectors and industry like military. In the last
300-400 years, it is considered to be as one of revolutionary idea (Wu et al. 2016). The public
key in model is freely distributed when it is paired with private key. The given public key is
mainly used for two purpose that is encryption and decryption.
Digital Signature
Digital signature is considered to be public key primitives of the given message based
authentication (Adhie et al. 2018). In the present world, it is commonly handwritten signature or
even typed messages. It needed for binding signature to the given message. A digital signature is
a good technique which is needed for binding persons and entity to the provided digital data. The
given binding can be easily received by the third party. Digital signature comes up with
cryptographic value which is estimated from data and secret key. The receiver of the message
requires proper assurance for understanding the message which belongs to the sender. The fact
key can never be transmitted or given in much secure way. In this method, both sender and
receiver aim to share a single key. Sender makes use of this particular key for plaintext and
cipher text to the message receiver (Mei, Chen and Huan 2016). On the other side, the receiver
aims to apply some kind of key for decryption of message and recovering the given plain text.
Public- Key Cryptography
Public key encryption is a well-known encryption technique which make use of paired of
public and private key algorithm which is needed for securing communication (Tao and Dubrova
2016). The sender of the message makes use of recipient for understanding the public key for
encrypting the message. For decryption of the sender message, only recipient private is used for
this. There are mainly two types of PKC algorithm that are RSA (Rivest, Shamir, and Adelman)
and DSA (Digital Signature Algorithm). PKC algorithm mainly focuses on meeting growing
secure communication which depends on various sectors and industry like military. In the last
300-400 years, it is considered to be as one of revolutionary idea (Wu et al. 2016). The public
key in model is freely distributed when it is paired with private key. The given public key is
mainly used for two purpose that is encryption and decryption.
Digital Signature
Digital signature is considered to be public key primitives of the given message based
authentication (Adhie et al. 2018). In the present world, it is commonly handwritten signature or
even typed messages. It needed for binding signature to the given message. A digital signature is
a good technique which is needed for binding persons and entity to the provided digital data. The
given binding can be easily received by the third party. Digital signature comes up with
cryptographic value which is estimated from data and secret key. The receiver of the message
requires proper assurance for understanding the message which belongs to the sender. The fact
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SYSTEM SECURITY
should be taken into consideration that originality of the message is not repudiated (Hynes,
Cheng and Song 2018). This particular factor is considered to be an important factor as it comes
up with high value of exchanged data.
Digital Certificates
A digital certificate-based authentication for web-based credentials which is used for
sender and understand the encrypted message in the form data form given trusted source. With
the help of digital certificates, consumers and business can easily security application for public
key infrastructure (Suveetha and Manju 2016). PKI comes up with technology which is needed
for securing both e-commerce and internet-based sources. Number of people and business in
online platform is increasing at much rapid rate. So, as a result, the access is becoming much
faster and cheaper in nature.
Authentication
Authentication method is all about understanding and verifying the identity of the user.
The whole given mechanism is all about understanding the request and verifying credentials. The
credential is compared to file in the database system of the authorized user (Cao et al. 2016).
Authentication process mainly works at the beginning of the application before any code is
allowed to execute. Various type of system requires different type of credential which is needed
for understanding the user identity. Credential mainly takes in the form of the given password
which is known to be secret in nature (Tao and Dubrova 2016). Authentication comes up with
two phases like identification and authentication. Identification phase mainly aims to provide
user identity to the given system.
should be taken into consideration that originality of the message is not repudiated (Hynes,
Cheng and Song 2018). This particular factor is considered to be an important factor as it comes
up with high value of exchanged data.
Digital Certificates
A digital certificate-based authentication for web-based credentials which is used for
sender and understand the encrypted message in the form data form given trusted source. With
the help of digital certificates, consumers and business can easily security application for public
key infrastructure (Suveetha and Manju 2016). PKI comes up with technology which is needed
for securing both e-commerce and internet-based sources. Number of people and business in
online platform is increasing at much rapid rate. So, as a result, the access is becoming much
faster and cheaper in nature.
Authentication
Authentication method is all about understanding and verifying the identity of the user.
The whole given mechanism is all about understanding the request and verifying credentials. The
credential is compared to file in the database system of the authorized user (Cao et al. 2016).
Authentication process mainly works at the beginning of the application before any code is
allowed to execute. Various type of system requires different type of credential which is needed
for understanding the user identity. Credential mainly takes in the form of the given password
which is known to be secret in nature (Tao and Dubrova 2016). Authentication comes up with
two phases like identification and authentication. Identification phase mainly aims to provide
user identity to the given system.
5SYSTEM SECURITY
Development in Cryptography
Cryptography tends to play a key role which can range from e-mail to cellular
communication (Sasi and Sivanandam 2015). This particular technology can be considered to be
an important part of information system in the upcoming years. Cryptography technology aims to
provide a wide range of technology which can range accuracy and confidentiality. This particular
technology can prevent fraud and validation of financial transaction. Cryptography can easily the
web pages and prevent any kind of industrial competition. In the coming years, this technology
will become vital as the communication has totally moved to system based networks.
Conclusion
The above pages of the report mainly deals with cryptography technology. In the above
pages of the report, various kind of cryptographic technology like public key cryptography,
secret key cryptography, digital signature, digital certificates, and authentication has been
discussed in details. After that various kind of development in cryptography method has been
provided in brief.
Development in Cryptography
Cryptography tends to play a key role which can range from e-mail to cellular
communication (Sasi and Sivanandam 2015). This particular technology can be considered to be
an important part of information system in the upcoming years. Cryptography technology aims to
provide a wide range of technology which can range accuracy and confidentiality. This particular
technology can prevent fraud and validation of financial transaction. Cryptography can easily the
web pages and prevent any kind of industrial competition. In the coming years, this technology
will become vital as the communication has totally moved to system based networks.
Conclusion
The above pages of the report mainly deals with cryptography technology. In the above
pages of the report, various kind of cryptographic technology like public key cryptography,
secret key cryptography, digital signature, digital certificates, and authentication has been
discussed in details. After that various kind of development in cryptography method has been
provided in brief.
6SYSTEM SECURITY
References
Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018, January. Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES)
Method in Communication System Based Near Field Communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Cao, X., Zhang, J., Fu, L., Wu, W. and Wang, X., 2016. Optimal secrecy capacity-delay tradeoff
in large-scale mobile ad hoc networks. IEEE/ACM Transactions on Networking (TON), 24(2),
pp.1139-1152.
Hynes, N., Cheng, R. and Song, D., 2018. Efficient deep learning on multi-source private
data. arXiv preprint arXiv:1807.06689.
Mei, W., Chen, Z. and Huang, C., 2016, May. Robust artificial-noise aided transmit design for
multi-user MISO systems with integrated services. In ICASSP (pp. 3856-3860).
Sasi, S.B. and Sivanandam, N., 2015. A survey on cryptography using optimization algorithms in
WSNs. Indian Journal of Science and Technology, 8(3), pp.216-221.
Suveetha, K. and Manju, T., 2016. Ensuring confidentiality of cloud data using homomorphic
encryption. Indian Journal of Science and Technology, 9(8).
Tao, S. and Dubrova, E., 2016. Ultra-energy-efficient temperature-stable physical unclonable
function in 65 nm CMOS. Electronics Letters, 52(10), pp.805-806.
Wu, Y., Schober, R., Ng, D.W.K., Xiao, C. and Caire, G., 2016. Secure massive MIMO
transmission with an active eavesdropper. IEEE Transactions on Information Theory, 62(7),
pp.3880-3900.
References
Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018, January. Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES)
Method in Communication System Based Near Field Communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Cao, X., Zhang, J., Fu, L., Wu, W. and Wang, X., 2016. Optimal secrecy capacity-delay tradeoff
in large-scale mobile ad hoc networks. IEEE/ACM Transactions on Networking (TON), 24(2),
pp.1139-1152.
Hynes, N., Cheng, R. and Song, D., 2018. Efficient deep learning on multi-source private
data. arXiv preprint arXiv:1807.06689.
Mei, W., Chen, Z. and Huang, C., 2016, May. Robust artificial-noise aided transmit design for
multi-user MISO systems with integrated services. In ICASSP (pp. 3856-3860).
Sasi, S.B. and Sivanandam, N., 2015. A survey on cryptography using optimization algorithms in
WSNs. Indian Journal of Science and Technology, 8(3), pp.216-221.
Suveetha, K. and Manju, T., 2016. Ensuring confidentiality of cloud data using homomorphic
encryption. Indian Journal of Science and Technology, 9(8).
Tao, S. and Dubrova, E., 2016. Ultra-energy-efficient temperature-stable physical unclonable
function in 65 nm CMOS. Electronics Letters, 52(10), pp.805-806.
Wu, Y., Schober, R., Ng, D.W.K., Xiao, C. and Caire, G., 2016. Secure massive MIMO
transmission with an active eavesdropper. IEEE Transactions on Information Theory, 62(7),
pp.3880-3900.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.