logo

Uses Of Cryptography Techniques

   

Added on  2021-05-30

8 Pages3872 Words245 Views
Information SecurityABSTRACT – This document depicts the limelight oncryptography techniques. The use of cryptography invarious technologies and its challenges has beendiscussed. There are various challenges associated withcryptography techniques that have been underlined inthis article. Keywords— Cryptography, encryption, secret keys,networking channels, unauthorized users. INTRODUCTIONCryptography techniques have been used to secure thesensitive data before transmitting over the network. Thedata are transmitted via internet and stored in such a waythat it is accessible from anywhere. There are chances ofdata leakage through network that may breach thesecurity of data as it directly affects the privacy ofinformation. To make sure that even if data gets leakeddue to some bugs the information is not in a readableformat. To assure that the data leakage will no causeleakage of actual information cryptography techniques areused. A.Research problemMost of the information is shared over internet, thus it ispossible that some third part access the information. Toavoid such cases cryptography is used as it providesverification that the data is sent by correct user and alsomake sure that information is delivered to valid user.Overview of CryptographyCryptography techniques are used to improve the securityof information so that users can make use of availability ofapplications on the network as all the applications useshigh quality of cryptography technology. These arebasically used to get secure communication as it isnecessary to keep the information confidential. Somebasics functions that are covered in cryptographytechnique are encryption and decryption (Staff, 2015).Encryption means transforming the actual text of data inthe form that is not readable by humans and decryption isgetting back the text in a human readable form (Lin, 2015).This technology requires the uses of secret key. This canbe assumed as a password without it the actual data willnot be unlocked. The password is shared only betweenactual sender and receiver. There are basically three forms of cryptographytechniques and they are used at different point of time.Symmetric, asymmetric and cryptographic hash functionsare three forms and all make use of a secret key (Jisc,2018). The strength of the cryptography algorithm isdirectly related to the length of key. In case of symmetriccryptography algorithm same key need to be used forencrypting and decrypting the data. The advantage ofusing this method is speed of transmission. There areseveral issues associated with the symmetric cryptographythat is every channel needs a separate secret key andsometimes it doesn’t provide authenticity of the data(Rivest, Shamir & Adleman, 2013). It creates the problemof sharing the key to long distance.Asymmetric cryptography uses the method of public andprivate keys. It provides better security as compared tosymmetric cryptography as it assures that authenticity ofdata packets is met. However, it lowers the speed oftransmission of data packets and also utilizes morenumber of resources (Tassel, 2016). The increasing use ofcryptography technology has raised various risks as it canbe used in some legal copyright issues. Additionally,cryptography gives the right to have secretcommunication which leads to increase in criminalactivities (Wilkins, Keefe & Rehman, 2015). Cryptography technology is one of the essentialtechniques used for building secure VPN. It assures thatmessages are received securely to the end users this isdone by using the secret. It makes sure that two entitiescan have secure communication on the network byencrypting the message. The complete process includesencrypting the text message by using the public key, andthen the message is forwarded in the network channels(Chaudhry, Farash, Naqvi & Sher, 2016). The encryptedmessage could not be read by any third party user and itwill only get decrypted by using private key that is knownonly to the valid receiver and it has not been disclosed onthe entire network. The intended user will get the datapackets from the channel and will decrypt the encryptedtext and read the original message. This guarantees thatintegrity, authenticity and confidentiality of data packetsare met. The use cryptography increases the overall security ofnetwork by maintaining confidentiality and can be used

Cryptography 1for communication of data in order to makeeavesdropping attack a difficult task for hackers (Cimato &Yang, 2017). It does not require any sophisticatedtechnology for encoding or decoding the information. Asthe information has been scattered over thecommunication channels thus theft of information isincreasing day by day (Tong, Duan, Zhuang, Cao, Wei &Lin, 2014). Cryptography resolves the problem and makesure that even if the information has been leaked, it won’tbe possible for the third party users to read the actualtext.B.APPLICATIONS OF CRYPTOGRAPHYTECHNOLOGIESCryptography technologies have been used in variousapplications in modern time. The use of cryptography hasexpanded in every field and has been used in day to daysecurity. In a modern world, delivery of emails and onlinecommunication is a common thing for business, friends ormultinational companies (Trilightzone, 2016). Thus it isimportant that communication in the giant network isdone through protected measure because the networksare unprotected and attackable. There are numerousattackers present on the channels to steal data and miss-use them (Utexas, 2017). Cryptography has importantexistence in our daily life and resolves the issues of dataleakage. It has been used for transferring money electronically overthe network by using a proper encryption system.It has used by organisation to have secure communicationby avoiding the third party to read the data (Chhibber &Patra, 2015).It can also be used for storage of data as it providessecrecy in storage as it automatically encrypts theinformation stored on the network.Digital signature is another application of cryptographythat is used to provide authentication and gain trustamong users.It can also be used for time stamping as that make surethat document is delivered within a particular time(Berger, Gueye & Klamti, 2017). Cryptography has made the tasks easy in daily life, as nowdays it has been used for electronic voting.LITERATURE REVIEWThere are various challenges that a network face due tocryptography. Interruption is one of them as it makes theinformation unavailable or unusable on the system byvalid users. This attack destroys the availability ofinformation by disabling the communication in betweenwhich can cause huge loss to the organisation(Verbauwhede, Balasch, Roy & Van Herrewege, 2015).Interception is other challenge that a network faces dueto the use of cryptography as it sometimes allowunauthorized party to gains access to the data packet byside channels. This violet the confidentiality of datapackets as the channels is not secure (Hemalatha &George, 2015). Cryptography makes sure that actual datais not read by the unauthorized user but they can modifythe assets. This can be done by altering the encryptioncodes and changing the values in the file this leads to lossof integrity. Fabrication is another issue as it unknowinglyinserts objects into the system. Other than that cryptography is a very complextechnology as it requires management of encryption keysthat add additional burden on the network. One bigdisadvantage of cryptography is that it secures the databut on the other side it increases the importance tosecuring the secret keys. The entire security is dependenton the secret keys thus if secret key gets lost it will createloss of data packets (Tutorialspoint, 2015). This is a veryexpensive process as it requires use of additionalresources and requires full disk involvement whichreduces the overall performance of the system which alsoopens the doors for attackers. Apart from that ofencryption is done correctly it may lead to false sense ofsecurity.The problem with cryptography is that it is not scalable asit is difficult to perform cryptographic hashing, exchangeof keys, digital signature construction and batchprocessing in large distance. The data stored on cloudneed to be protected by using cryptography. Internetprovides the ability to communicate freely with vastnumber of parties group but is important to protect thedata from denial of service attacks. Problem withcryptography technology is that if it is not regulatedregularly then it wouldn’t be possible to filter the wrong

Cryptography 2data and can cause false information to reach to the endusers (Menezes, Sarkar & Singh, 2016). If cryptography ismonitored regularly then it does not address concernsrelated to security but is difficult to manage the incryptography as it is based on electronic commercesystem. Various challenges that can be seen in an organisation dueto cryptography is difficulty in identifying andimplementing appropriate organizational structures asthere are various processes that require legal assistance todiscovery which data can be encrypted and which cannotbe (Bojinov, Sanchez, Reber, Boneh & Lincoln, 2014). It isalso difficult to understand the existing compliance andaudit standards as every organisation has differentinformation management lifecycle. Encryption and keymanagement is the biggest challenge in bindingcryptographic operations and maintain the identity ofusers and information (Poornachander. 2017).Additionally disadvantage of using cryptography forencrypting the data is speed which is more than thetraditional encrypting method. Sometimes the encryptiondone using cryptography makes the authorised userdifficult to access the data. If in some cases completebreakdown of information occurs cryptographytechnology will not able to handle some cases (Buchmann,et. al, 2017). Apart from that applying cryptographyincreases the cost as it does not provide protection againstthe vulnerabilities that occur due to poor design ofnetworkprotocols and procedures (Kocher, 2018). PURPOSE AND POSSIBLE ATTACK OF CRYPTOGRAPHYPurposeThe main purpose of cryptography is transmitting theinformation over large network while maintaining theauthentication, confidentiality, integrity and non-repudiation cases. It maintains the authentication of datathat is verifying the actual identity of user so that it is surethat data is not received from wrong user. Cryptographyhelps in maintaining data confidentiality as it makes theactual data set unavailable to unauthorized user. It is onlypossible by use of encryption that makes the dataexchange possible with valid users.Attacks due to cryptographyThe attacks that occur on the system due to cryptographyare cipher text attack,known plaintext attack, chosenplaintext attack, brute force attack, birthday attack, man inmiddle attack, side channel attack, timing attacks and faultanalysis attack. These attacks simply focus on attacking thekeys and try to break the chipper text (Goud & Reddy,2016). The time taken to break the key is dependent onlength of key. These attacksare used to find collisions thathappen in the hash function.FUTURE OF CRYPTOGRAPHY TECHNIQUESThere are a number of advantages and disadvantages ofuse of cryptography in today’s business world. Due totechnological advancements, the process of encryptionand decryption has become more efficient and it alsoenables more information to pass over a single network.The technology of quantum computation has becomesubstantially popular nowadays which is used byenterprises for storing their business data as quantumsuperposition which resulted in increasing the speed ofcomputation than compared to old methods.Furthermore, this technology has a promising future as itincreases the security of data and by using secret keyswhich protects it from cyber criminals over a wide range ofnetwork. All these technologies have become possible dueto the implementation of cryptography. The significance ofcyber security is growing parallel with the importance ofcryptography as the demand for securely sending dataover large networks grows as well by using quantumphysics. Moreover, cryptography is a crucial element inthe cyber security since it prevents the risk of potentialside-channel attack on the system. As the amount of dataincreases over the internet, the risk of cyber securitygrows as well. Therefore, the popularity of cryptographywill increase with time as the demand for cyber securityincreases for avoiding unauthorised access to the data.Classical Cryptographic Algorithm TechniquesIn cryptographic algorithms, there are three techniqueswhich differ based on encryption and decryptiontechnique.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Cryptography Techniques
|8
|3543
|84

CSI2102 - Information Security Technologies | Case Study
|14
|3537
|42

Encryption Symmetric Key Encryption
|9
|2853
|351

Network Security: Cryptography, Data in Transit and Rest, Cloud Computing
|10
|1928
|459

Hybrid Encryption
|4
|798
|8

Secure Encryption Technologies: A Comprehensive Guide
|15
|586
|240