logo

Information Security Cryptography Techniques

   

Added on  2021-05-31

8 Pages3543 Words84 Views
Information Security- Cryptography techniquesAbstract- In this report limelight is thrown oncryptography that is a technique that makessure that even if a hacker steels the data it isnot understood by them. Various challenges,purpose, application and benefits have beendiscussed.INTRODUCTIONCryptography technology has gainedimportance in recent years as it secures thedata before transmitting overt the network. Thesensitive information gets transmitted over thenetworking channels and it is accessible fromanywhere. There are possibilities of dataleakage over the network which violates theconfidentiality of data. Cryptography is a waythat translates the data in a form that is notreadable. OVERVIEW OF THE TECHNOLOGYCryptography procedures are used to enhancethe security of data with the goal thatorganization can believe that they can accessthe data from anywhere without the fear ofgetting the actual data read due to the use ofcryptography innovation. It is essentially used toget secure communication as it is important tokeep the data integrated and available(Hemalatha & George, 2015). A large portionof the data is shared over web, thus it has thepossibility to get accessible by some third party.To stay away from such cases cryptography isused as it gives confirmation that theinformation is sent by rectify user andfurthermore ensure that data is conveyed tovalid user. Some basic functions that are used incryptography strategy are encryption anddecryption.Encryption implies changing the actual contentof information in a form that is not understoodby individuals. The information could be readonly when it is decrypted by the valid user andthis could be done only by using secret key(Olijnyk, 2018). Thus it can be stated thatcryptography may sure that communicationhappen between valid sender and receiver andinformation is not readable by any third party inbetween. There are fundamentally three types ofcryptography methods and they are used atvariouscircumstances.Symmetriccryptography, asymmetric cryptography andhash function are three structures havingdifferent capabilities but all make utilization of asecret key (Mahto, Khan & Yadav, 2016).The quality of the cryptography algorithm isspecifically identified with the length of key. Thelonger the length of key the harder it would itbe for the hackers to break the key. In case ofsymmetric cryptography for encrypting anddecrypting the data same key need to be used.This is difficult in some cases to share the key tothe actual receiver as it might be located infaraway location. Thus it makes sure that datawill be decrypted only by the valid user when hewill receive the key. The benefit of utilizing thistechnique is speed of transmission. There are afew issues related with the symmetriccryptography that is each transaction needs adifferent secret key (Rajyalaxmi, Krishna,Anusha, Khan & Madhumati, 2017). Thus itis difficult to generate the secret key for everycommunication. It makes sure that legitimacyof the data is not violated but the only issue ofsharing the way is distance.

Asymmetric cryptography uses the strategy ofusing two keys one is kept as public and otheras private key (MitaMitali & Sharma, 2014).It gives higher security if compared tosymmetric cryptography as it guarantees thatvalidness of information is met. In thistechnique sharing of secret keys is easy as thereare two different keys. It also enhances thetransmission of data packets but it uses morenumber of assets (Bokefode Jayant, UbaleSwapnaja, Pingale Subhash, KarandeKailash & Apate Sulabha, 2015).Cryptography technology has been expanded inrecent years as it has removed danger of databeing leaked. Cryptography technology hasraised the issue of copyright and criminalactivities have also increased as hackers how tryto capture the key by performing mysteriousactivities. These technologies have also been used forcreating secure VPN network. It makes use ofsecret key which make sure that message isdecrypted by a correct end user (Rani, Mary &Euphrasia, 2016). Cryptography techniquesmake sure that secure communication takeplace over a network and this is accomplishedby encrypting the message. Asymmetriccryptography involves encoding the originalmessage with the help of public key and thentransmitting the data packet over thecommunication channel. Once the data packethas been received by a valid receiver they makeuse of private key to decrypt the message. Themessage can only be decoded by the personhaving the private key thus it make sure thatmessage is read only by the correct user. Thisguarantee that data will be read only by theintended user and information remainsconfidential and authenticated (Kaur &Malhotra, 2016).Cryptography techniques have improved theoverall security of communication channels bymaking sure that data remains confidential. Bythe use of this technique it has madeeavesdropping attack difficult to be performed. APPLICATIONS OF CRYPTOGRAPHYTECHNOLOGIESThe use of cryptography techniques has beenexpanded in every sector and there are variousapplications that have used cryptographytechniques in their mechanism. This has beenwidely used because of the security levelprovided by it especially used in onlinecommunications while transferring personal orsensitive data. Not only in personalcommunications but have been widely used forbusiness concern or in large multinationalcompanies (Kapoor & Yadav, 2016). It makessure that while transferring the data packetsover the large network the data remainssecured and there are no chances ofinformation to be leaked or attacked. As thereare numerous hackers waiting over the networkto steal the sensitive data but cryptographymake sure that even if the data packets havebeen captured by hackers they won’t be able toread the actual information(Saranya,Mohanapriya & Udhayan, 2014). Thuscryptography has become an important part fordata security. There are various applications wherecryptography has been used (Staff, 2015). Online transactions have becomepossible over the network due to theuse of cryptography.This has been used by largeorganisation as it avoid the third partyusers to access their information

It is used in online storage of datapackets as it automatically encodes theinformation in a form that is notreadable.One of the widely used applications ofcryptography is digital signature as itprovides authentication to users andincreases the trust.It is also used in time stamping as itassures that information is delivered ina predefined time limit.It has also been used in electronicvoting which makes the manual workeasy.LITERATURE REVIEWThere are various consequences that occur in anetwork due to cryptography. One of eh majorchallenge is interruption by third party user thatmakes the information or inaccessible by thevalid user. This violates the rule of availability ofdata packets as the hackers disable thecommunication between the actual users andthat can cause huge loss to an organization.Other challenge that occurs over the channeldue to cryptography is interception that permitssome unauthorized user to gain access to theinformation by using some false routes. It spoilsthe confidentiality of data packets. The networkis not secure and that increases the chances ofattacks (Upadhyaya, 2015). Cryptography is avery complex process as it requires managingthe secret keys properly as complete securityrelies on keys. It is an expensive process andalso makes sure of large number of resourceswhich in turn increase the cost. Cryptography technique is not scalable to largedistance if using symmetric technique becauseit becomes difficult for exchanging the keys.Cloud computing has also gained popularity dueto the use of cryptography. Cryptographytechniques need to be regulated on regularbasis otherwise some attacker might modify theencoded data and that may result in deliveringirrelevant data packet to the receiver. Various challenges associated while usingcryptography technique is that they requirelegal assistance (Tassel, 2016). Data need to be selected because all theinformation cannot be encoded without thepermission. Before applying encryption to datapackets the audit standards and complianceneed to be understood. Every organization hasdifferent standards thus it becomes difficult tomanage the information. Key management isone of the biggest challenges in cryptographytechnology as these operations need to bebided properly so that identity is not lost andactual data has been recovered by decrypting it(Duan, Wang, Li, Sheng, Wang & Zhang,2017). The other drawback that could bepresent by using cryptography is speed oftransmission. The speed decreases as comparedto the old traditional method. Cryptographysometimes makes it difficult for the valid user toaccess the information. Other than thatcryptography is not capable to handle thesituation of complete breakdown ofinformation. Apart from that applyingcryptography surges the cost and sometimes itdo not provide protection against thevulnerabilities that may occur in the system dueto poor design of networkprotocols andprocedures (Tutorialspoint, 2015).FUTUREOFCRYPTOGRAPHYTECHNIQUESCryptography has already been used in themodern world but it offers few advantages aswell as disadvantages. The advancement intechnology has laid to the discovery of ellipticcurve cryptography which makes sure that

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Uses Of Cryptography Techniques
|8
|3872
|245

Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172

Secure Encryption Technologies: A Comprehensive Guide
|15
|586
|240

Introduction to Information Assurance and Information Security Assignment 2022
|11
|1301
|11

Security in Information Technology | Assignments
|13
|3545
|119

Exchanging of Keys Between the Two Parties in a Communication
|5
|1820
|81