MITS50004 IT SECURITY.

Verified

Added on  2022/10/09

|8
|455
|95
Presentation
AI Summary
Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style. Your report or critique must include: Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID. Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs). Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MITS50004 IT SECURITY
(Encryption Technique)
Name of the Student
Name of the University
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Content
Introduction
Attribute-Based Encryption
Key Policy ABE (KP-ABE)
Conclusion
References
Document Page
Introduction
Encryption can be defined as the
security method which is designed in a
way that specific and authorized
people can access or read it.
It merely makes use of encryption
algorithm that generates cipher text
that can be read, if and only if it can
be decrypted.
There are mainly kinds of encryption
technique that is symmetric and public
Document Page
Attribute-Based Encryption
ABE is a well-known public key cryptography
which makes use of one to many method. It
generally identifies both encrypting and
decrypting data.
Both the cipher text and secret key completely
depends on the given attributes

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Key Policy ABE (KP-ABE)
KP-ABE stands for key policy ABE which is
updated version of ABE.
In this, decryption for cipher text is only
done if the given attributes the user secret
key.
In this method, a proper policy is assigned
for the cipher text at the time of creation.
Document Page
Conclusion
The point can be noted that the presentation
highlights the use of encryption technique which is
being in cloud computing. ABE stands for
Attributed-based encryption which is new public
key encryption method. This particular technique
works on the basis of single to many. In public key
encryption, most of data is being is stored in the
third party server. The distribution key aims to
authorize the different user. It comes up with many
drawbacks like efficient management of distribution
key to authorized user.
Document Page
References
[1] R., Karmakar, S. Chatopadhyay, and R., Kapur. Encrypt flip-flop: A novel logic
encryption technique for sequential circuits. arXiv preprint arXiv:1801.04961, 2018.
[2] S., Farwa, T., Shah, N., Muhammad, N., Bibi, A Jahangir, and S., Arshad. . An
image encryption technique based on chaotic S-box and Arnold transform. Int. J. Adv.
Comput. Sci. Appl, 8, pp.360-364, 2017.
[3] S., Panghal, S. Kumar, and N., Kumar. Enhanced security of data using image
steganography and AES encryption technique. International Journal of Computer
Applications, 42, 2016.
[4] S., Roy, J., Karjee, U.S. Rawat, and N., Dey. . Symmetric key encryption technique:
A cellular automata based approach in wireless sensor networks. Procedia Computer
Science, 78, pp.408-414, 2016

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]