Your contribution can guide someone’s learning journey. Share your
documents today.
Information Security- Cryptography techniques Abstract- In this report limelight is thrown on cryptography that is a technique that makes sure that even if a hacker steels the data it is not understood by them. Various challenges, purpose, application and benefits have been discussed. INTRODUCTION Cryptographytechnologyhasgained importance in recent years as it secures the data before transmitting overt the network. The sensitive information gets transmitted over the networking channels and it is accessible from anywhere.Therearepossibilitiesofdata leakage over the network which violates the confidentiality of data. Cryptography is a way that translates the data in a form that is not readable. OVERVIEW OF THE TECHNOLOGY Cryptography procedures are used to enhance thesecurityofdatawiththegoalthat organization can believe that they can access the data from anywhere without the fear of getting the actual data read due to the use of cryptography innovation. It is essentially used to get secure communication as it is important to keepthedataintegratedandavailable (Hemalatha & George, 2015). A large portion of the data is shared over web, thus it has the possibility to get accessible by some third party. To stay away from such cases cryptography is usedasitgivesconfirmationthatthe informationissentbyrectifyuserand furthermore ensure that data is conveyed to valid user. Some basic functions that are used in cryptographystrategyareencryptionand decryption. Encryption implies changing the actual content of information in a form that is not understood by individuals. The information could be read only when it is decrypted by the valid user and this could be done only by using secret key (Olijnyk, 2018). Thus it can be stated that cryptographymaysurethatcommunication happen between valid sender and receiver and information is not readable by any third party in between. Therearefundamentallythreetypesof cryptography methods and they are used at variouscircumstances.Symmetric cryptography,asymmetriccryptographyand hashfunctionarethreestructureshaving different capabilities but all make utilization of a secret key(Mahto, Khan & Yadav, 2016). The quality of the cryptography algorithm is specifically identified with the length of key. The longer the length of key the harder it would it be for the hackers to break the key. In case of symmetriccryptographyforencryptingand decrypting the data same key need to be used. This is difficult in some cases to share the key to the actual receiver as it might be located in faraway location.Thus it makes sure that data will be decrypted only by the valid user when he will receive the key. The benefit of utilizing this technique is speed of transmission. There are a fewissuesrelatedwiththesymmetric cryptography that is each transaction needs a differentsecretkey(Rajyalaxmi,Krishna, Anusha, Khan & Madhumati, 2017). Thus it is difficult to generate the secret key for every communication.It makes sure that legitimacy of the data is not violated but the only issue of sharing the way is distance.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Asymmetric cryptography uses the strategy of using two keys one is kept as public and other as private key(MitaMitali & Sharma, 2014). Itgiveshighersecurityifcomparedto symmetric cryptography as it guarantees that validnessofinformationismet.Inthis technique sharing of secret keys is easy as there are two different keys. It also enhances the transmission of data packets but it usesmore number of assets(Bokefode Jayant, Ubale Swapnaja,PingaleSubhash,Karande Kailash&ApateSulabha,2015). Cryptography technology has been expanded in recent years as it has removed danger of data beingleaked.Cryptography technology has raisedtheissueofcopyrightandcriminal activities have also increased as hackers how try to capture the key by performing mysterious activities. These technologies have also been used for creating secure VPN network. It makes use of secret key which make sure that message is decrypted by a correct end user(Rani, Mary & Euphrasia,2016).Cryptographytechniques makesurethatsecurecommunicationtake place over a network and this is accomplished byencryptingthemessage.Asymmetric cryptographyinvolvesencodingtheoriginal message with the help of public key and then transmittingthedatapacketoverthe communication channel. Once the data packet has been received by a valid receiver they make use of private key to decrypt the message. The message can only be decoded by the person having the private key thus it make sure that message is read only by the correct user. This guarantee that data will be read only by the intendeduserandinformationremains confidentialandauthenticated(Kaur& Malhotra, 2016). Cryptographytechniques haveimprovedthe overall security of communication channels by making sure that data remains confidential. By theuseofthistechniqueithasmade eavesdropping attack difficult to be performed. APPLICATIONSOFCRYPTOGRAPHY TECHNOLOGIES The use of cryptography techniques has been expanded in every sector and there are various applicationsthathaveusedcryptography techniques in their mechanism. This has been widelyusedbecauseofthesecuritylevel providedbyitespeciallyusedinonline communications while transferring personal or sensitivedata.Notonlyinpersonal communications but have been widely used for businessconcernorinlargemultinational companies(Kapoor & Yadav, 2016). It makes sure that while transferring the data packets overthelargenetworkthedataremains securedandtherearenochancesof information to be leaked or attacked. As there are numerous hackers waiting over the network to steal the sensitive data but cryptography make sure that even if the data packets have been captured by hackers they won’t be able to readtheactualinformation(Saranya, Mohanapriya&Udhayan,2014).Thus cryptography has become an important part for data security. Therearevariousapplicationswhere cryptography has been used(Staff, 2015). Onlinetransactionshavebecome possible over the network due to the use of cryptography. Thishasbeenusedbylarge organisation as it avoid the third party users to access their information
ï‚·Itis used in onlinestorageofdata packets as it automatically encodes the informationinaformthatisnot readable. ï‚·One of the widely used applications of cryptography is digital signature as it provides authentication to users and increases the trust. ï‚·It is also used in time stamping as it assures that information is delivered in a predefined time limit. ï‚·Ithasalsobeenusedinelectronic voting which makes the manual work easy. LITERATURE REVIEW There are various consequences that occur in a network due to cryptography. One of eh major challenge is interruption by third party user that makes the information or inaccessible by the valid user. This violates the rule of availability of datapacketsasthehackersdisablethe communication between the actual users and that can cause huge loss to an organization. Other challenge that occurs over the channel due to cryptography is interception that permits some unauthorized user to gain access to the information by using some false routes. It spoils the confidentiality of data packets. The network is not secure and that increases the chances of attacks(Upadhyaya, 2015). Cryptography is a very complex process as it requires managing the secret keys properly as complete security relies on keys. It is an expensive process and also makes sure of large number of resources which in turn increase the cost. Cryptography technique is not scalable to large distance if using symmetric technique because it becomes difficult for exchanging the keys. Cloud computing has also gained popularity due totheuseofcryptography.Cryptography techniques need to be regulated on regular basis otherwise some attacker might modify the encoded data and that may result in delivering irrelevant data packet to the receiver. Variouschallengesassociatedwhileusing cryptographytechniqueisthattheyrequire legal assistance(Tassel, 2016) .Data need to be selected because all the information cannot be encoded without the permission. Before applying encryption to data packets the audit standards and compliance need to be understood. Every organization has different standards thus it becomes difficult to manage the information. Key management is one of the biggest challenges in cryptography technologyastheseoperationsneedtobe bided properly so that identity is not lost and actual data has been recovered by decrypting it (Duan, Wang, Li, Sheng, Wang & Zhang, 2017).Theotherdrawbackthatcouldbe presentbyusingcryptographyisspeedof transmission. The speed decreases as compared to the old traditional method. Cryptography sometimes makes it difficult for the valid user to accesstheinformation.Otherthanthat cryptographyisnotcapabletohandlethe situationofcompletebreakdownof information.Apartfromthatapplying cryptography surges the cost and sometimes it donotprovideprotectionagainstthe vulnerabilities that may occur in the system due topoordesignofnetworkprotocolsand procedures(Tutorialspoint, 2015). FUTUREOFCRYPTOGRAPHYTECHNIQUES Cryptographyhas already been usedinthe modern world but it offers few advantages as wellasdisadvantages.Theadvancementin technology has laid to the discovery of elliptic curvecryptographywhichmakessurethat
encryption and decryption takes place in less amount of time and also allows higher data to be passed over the network (Desmedt, 2016). Otherphenomenawhichemergedinthis techniquearequantum computation that is used to store the data in the form of quantum superposition.This allows the computation of numbers to be done in faster than the old method. The future of this technology is very bright as it allows the data to be secured from attackers by using secret keys that are used to secure the data over wide ranging network. This is done by making large scale implementation of cryptographypossibleandpractical (Trilightzone,2016).Cybersecurityis progressingandthereasonbehindthatis somewhere cryptography as they provide the future of reality by sending data securely over longdistancesusingquantumphysics. Cryptography is an important component in the security of future as it provides security of data from hackers and they ensure that our system is secureandtherearenochancestohave potential side-channel attack. Day by day the data will increase on the networks, increasing data on the internet increases the chances of attacks (Choo, Domingo-Ferrer & Zhang, 2016). Thus to make sure that actual data is not relived to the unauthorized user cryptography need to be used. Hence, clearly it can be stated that the need of cryptography will grow data by day as themainfocusisonsecuringthedata. CLASSICALCRYPTOGRAPHICALGORITHMTECHN IQUES Therearethreetechniquesusedin cryptographicalgorithms,allthethree algorithms differ from each other on the basis theyencryptionanddecryptiontechnique. •Secret Key Cryptography: In this for doing encryptionasinglekeyisusedforboth encryption and decryption of data packets. This technique is also called a symmetric encryption. It was primarily used for maintain the privacy and confidentiality of information. As it shares same key for encrypting and decrypting it is difficult to transfer the key to long distance. If receiver is located in far way region it will difficult to transfer the key and it takes lot of time(Sasi&Sivanandam,2015). •PublicKeyCryptography:Itisanother method that uses separate keys for encryption and decryption. If one key is used for encryption thendifferentkeywouldbeusedfor decryption.Thistechniqueisalsocalled asymmetric encryption. It was primarily used forauthenticationandforkeyexchange. •HashFunction:Itmakesuseof mathematicalformulasfortransformingthe information in a chipper text format and make use of digital fingerprint. It was primary used for maintainingtheauthenticity. The issues that have been addressed in the current literature is that cryptography need to handled properly so that third party users do notenterthechannelsandmodifythe encrypted code. Once the encrypted code is modifiedthefilewillnotbeabletoget decrypted which may cause loss of important data. Sometimes therearechances of data leakage as the information is secured but the channels through which data transfer is not secured(Vijayakumar,Indupriya& Rajashree,2016).Thussecuringthe information does not completely secure the entire system so network security need to be addressedaswell.Otherissueisthatin cryptography security relies completely on the keys thus if in some cases keys are lost the entire data will be lost which can act as a huge loss to the organisation. The keys need to be protectedtomakesurethatdatawillbe protected.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
These are few issues which have not been addressed in the current scenario. Thus in the futurecryptographywillcomeinadvanced versionthatwillmakesurethataresome alternativestoprotectthekeysaswell. According to me these issues are very critical like if I am performing symmetric cryptography and receiver is located in some other country so transferring the keys to the receiver is a time consuming as well as difficult job. Thus it is necessary to take care of secret keys along with thenetwork.Intoday'sworldcryptography technology is used at peak as it provides pretty good privacy services, with increasing use of cryptography it makes difficult for the user to keepitsecured. Additionally it can be stated that it is very importanttomaintainsecurityofthedata packetsbecausetheycontainprivate informationofvariousorganisations, government as well as personal data which cannotbeleaked(Suri& Singh, 2016). Cryptographic algorithms are designed in a way so that digital threats cannot hit the network andhelpsinoperatinginawell-defined manner. These security models make sure that integrity,confidentialityandavailabilityis maintained. PURPOSE OF CRYPTOGRAPHY Cryptographyassuresthatwhiledatais transmittedoverthenetworkauthenticity, confidentlyandintegrityismaintained.The main purpose of cryptography technique is to make sure that all these three parameters are fulfilled.It also takes care that authentication of information is met that means information is deliveredactualuser(Utexas,2017). Cryptographyfocusesonpreserving confidentiality of data by making the actual datasetinaccessibletothirdpartuser. Encryption and decryption is the only way that assuresthatdatahasbeendeliveredand received from valid user. ATTACKS DUE TO CRYTOGRAPHY There are various attacks that a network might face due to use of cryptograph technique. Some of them are cipher text attack, plain text attack, side channel attack, timing attack, brute force attack and birthday attack. These attacks try to capture the keys and break the encoded data packets(Tripathi & Agrawal, 2014). They might time longer time to break the key but there are chances if the keys get broken they canreadtheactualdatapacket.These attacksarealsousedtofindcollisionsthat happen in the hash function.
CONCLUSION It can be conclude from this report that the use of cryptography has increased and is widely used in various sectors. Cryptography technique isveryusefulasitmakesurethatsecure communication takes place and no untrusted user can access the actual information. Apart from the benefits there are various challenges that are associated with this technique. A brief discussion has been done in this report in all direction on the cryptography technology. Thus couldbeconcludedthatintoday’sworld cryptographytechnologyactasasaviorin terms of protecting data from hackers as it make use of secret keys.
BIBLIOGRAPHY Bokefode Jayant, D., Ubale Swapnaja, A., PingaleSubhash,V.,Karande Kailash,J.,&ApateSulabha,S. (2015).Developingsecurecloud storage system by applying AES and RSA cryptography algorithms with rolebasedaccesscontrol model.InternationalJournalof Computer Applications (0975–8887) Volume. Duan, G., Wang, Y., Li, M., Sheng, Y., Wang,J.,&Zhang,S.(2017). ResearchonTechniquesand MethodsofDeveloping CryptographyVirtual Laboratory.International Journal of PerformabilityEngineering,13(8), 1371. Hemalatha.D.&George.J.(2015). CryptographicTechniques,Threats andPrivacyChallengesinCloud Computing.Retrievedfrom https://pdfs.semanticscholar.org/b92e /11b2af6a22d3475eaacf1ca4e774553 87885.pdf Kapoor, V., & Yadav, R. (2016). A Hybrid CryptographyTechniquefor ImprovingNetwork Security.InternationalJournalof Computer Applications (0975–8887) Volume. Kaur, S., & Malhotra, S. (2016). A Review onImageEncryptionUsingDNA BasedCryptography Techniques.International Journal of AdvanceResearchinComputer ScienceandManagement Studies,4(3). Mahto, D., Khan, D. A., & Yadav, D. K. (2016, June). Security Analysis of EllipticCurveCryptographyand RSA. InProceedings of the World CongressonEngineering(Vol.1, pp. 419-422). MitaMitali, V. K., & Sharma, A. (2014). A surveyonvariouscryptography techniques.International Journal of Emerging Trends & Technology in ComputerScience(IJETTCS),3(4), 307-312. Olijnyk,N.V.(2018).Examinationof China’sperformanceandthematic evolution in quantum cryptography researchusingquantitativeand computationaltechniques.PloS one,13(1), e0190646. Rajyalaxmi, K. P., Krishna, B. M., Anusha, K., Khan, H., & Madhumati, G. L. (2017).PRBASEDDNA CRYPTOSYTEMDESIGNWITH SYMMETRICAND ASYMMETRIC CRYPTOGRAPHY TECHNIQUES. Rani, M. M. S., Mary, G. G., & Euphrasia, K. R. (2016). Multilevel multimedia securitybyintegratingvisual cryptographyandsteganography techniques.InComputational Intelligence,CyberSecurityand ComputationalModels(pp.403- 412). Springer, Singapore. Saranya, K., Mohanapriya, R., & Udhayan, J. (2014). A review on symmetric
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
keyencryptiontechniquesin cryptography.InternationalJournal ofScience,Engineeringand TechnologyResearch (IJSETR),3(3), 539-544. Staff. C. (2015). Cryptography Techniques forSecureCommunications. Retrievedfrom http://certmag.com/cryptography- techniques-for-secure- communications/. Suri S., & Singh, Y. (2016). A Proposed Cipher Technique with a Study of Existing Cryptography Techniques. Tassel. D. (2016). Cryptographic techniques forcomputers.Retrievedfrom https://www.computer.org/csdl/proce edings/afips/1969/5073/00/50730367 .pdf. Trilightzone. (2016). Cryptography in Daily Life.Retrievedfrom https://www.trilightzone.org/cryptog raphy_in_daily_life.html Tripathi,R.,&Agrawal,S.(2014). Comparative study of symmetric and asymmetriccryptography techniques.International Journal of Advance Foundation and Research in Computer (IJAFRC),1(6), 68-76. Tutorialspoint.(2015).Cryptography Benefits&Drawbacks.Retrieved from https://www.tutorialspoint.com/crypt ography/benefits_and_drawbacks.ht m. Upadhyaya,S.(2015).Secure communicationusingDNA cryptographywithsecuresocket layer(SSL)protocolinwireless sensor networks.Procedia Computer Science,70, 808-813. Utexas. (2017). Cryptography in Everyday Life.Retrievedfrom http://www.laits.utexas.edu/~anorma n/BUS.FOR/course.mat/SSim/life.ht ml. Vijayakumar, P., Indupriya, S., & Rajashree, R.(2016).Ahybridmultilevel securityschemeusingDNA computingbasedcolorcodeand ellipticcurvecryptography.Indian JournalofScienceand Technology,9(10).