logo

Exchanging of Keys Between the Two Parties in a Communication

   

Added on  2020-02-24

5 Pages1820 Words81 Views
TOPIC 3SYMMETRIC KEY ENCRYPTION: Symmetric key encryption is a kind of encryption system which uses same keys for encryption as well as decryption of a communication. Thereby it means the sender and the receiver are to use the same key for interpreting the communication string. For example, AES128, AES 192 and AES 256 are some of the most widely used symmetric encryption keys. The said method of encryption is safe and secure as well as works at a faster pace. But the disadvantage that it offers is that there is no warranty as to the safe exchanging of keys between the two parties in a communication (technopedia. 2017). Thus the said methodology of encryption conforms to a safe way of exchanging data.PUBLIC KEY ENCRYPTIONPublic key encryption is a kind of encryption which utilises two mathematically linked but keys which are not identical in nature, thus named as private and public. The later key ensures encryption of information and the former key decrypts the message. It is this condition which helps to differentiate the same with the symmetric form of encryption. The one accepting the dialogue will get hold of a special key which is the private or furtive key. However the key which is available by the one who is to receive the message is termed as public key. RSA Cryptosystem , EiGamal Cryptosystem and Elliptic Curve Cryptography arethe three most prominent public key. Hence it can be said that public key encryption is a system which allows occurrence of an encryption only if the public key is available and decryption only if the private key is available (redhat.com. 2017). In this manner, it is next to impossible to interpret the private key although the public key is known to the receiver. HASHINGAlteration of a loop of typesets into a normally known length value of a petite type or key that denotes the exclusive order is termed as hashing. With a diminutive hashed key, one can easily search for the various data and strings, instead of searching for the same via an exclusive value. Hashing also contributes towards encrypting and decrypting of digital signatures, catalogue the exclusive key and also is utilised in future every time the data is linked with the assessment or key is to be resumed. It is a monologue operation (James. 2017). Therefore it is established that hashing is one of the most acceptable methods to

conform security at the time of process of transmission of strings of communication specially when the message is for an exclusive receiver. It is the symmetric key encryption methodology which is the best for maintaining both authentication and confidentiality of information. REFERENCES:James,M. (2016). Hashing: The Greatest Idea in Programming. Retrieved from http://www.i-programmer.info/babbages-bag/479-hashing.htmlRedhat.com. (2017). Chapter 1: Introduction to Public Key Cryptography. Retrieved from https://access.redhat.com/documentation/en-US/Red_Hat_Certificate_System/8.1/html/Deploy_and_Install_Guide/Introduction_to_Public_Key_Cryptography.htmlTechnopedia. (2016). Symmetric Encryption. Retrieved from https://www.techopedia.com/definition/1789/symmetric-encryptionTOPIC 4Denial of Service attacks (DOS) wherein the attackers ensure that the network users are unable to use the information by flowing in a huge number of requests that link the resources is one such cyber threat which is feared by all. Thus an intended attempt to ensure crippling of a network or a website from its expected users can be listed under the DOS attack. Two ways to defend your company from denial of service attacksare:1.First method of defending against the DOS attack is the companies can buy and position specific DOS alleviation equipments. It is a specialised hardware that is placed within the information centre of a company in abut of the regular servers and routers and a specially formulated in such a way which helps to find out and sort the malware traffic. The said deice is a costly one and is useful only when there is a DOS attack. Further it should be updated on a frequent basis so that the attack can be defended well as the older versions may not be able to deal with the same. Further to this the said method is highly useful for defending a small network attack and not a voluminous one. 2.In the world of cloud computing, it is equally important for the enterprises who have opted for cloud storage to ensure that defend is ready against the attacks to the cloud

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Symmetric Key Encryption | Assignment
|6
|2152
|151

Information Security Question Answer 2022
|6
|875
|10

Public Key Cryptography and RSA pdf
|44
|2675
|91

Symmetric Encryption Assignment
|5
|884
|175

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits
|10
|2275
|404

Cryptography Algorithm
|11
|2443
|35