Principles and Methods in Cryptographic Security Report

Verified

Added on  2022/09/12

|4
|638
|19
Report
AI Summary
This report delves into the core principles of cryptographic security, examining the public key cryptosystem and its components. It defines key terms such as plaintext, encryption algorithms, secret keys, ciphertext, and decryption algorithms, providing a clear understanding of their roles in securing data. The report highlights the use of digital signatures and the importance of encryption and decryption processes. It also references key academic sources to support its analysis. The report provides a foundational understanding of cryptography and offers a concise overview of the terminology and processes involved in securing data through encryption and decryption techniques.
Document Page
Running head: PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
Discussions
The public key cryptosystem is a system that utilizes a pair of keys that is the public
keys that may be extensively disseminated and the private keys that are known only to the
user of the keys (Aggarwal et al.,2018). A sender can merge a message with a private key in
order to create a digital signature that is short on the message.
The principle ingredients of the public key cryptosystem include a plaintext,
encryption algorithm, secret key, cipher text, the decryption algorithm, and original text that
is sent.
The plaintext is a term that is used in cryptography and it refers to a message after
decryption and before encryption (Luo, 2019). It can be said that it is a message in a form that
can be easily read by the humans.
A mathematical process in order to perform the encryption of data. Using this
algorithm, the information is made into a cipher that is meaningless and it needs the use of a
key in order to change the data into its original form (Barker & Mouha,2017).
A secret key is a bit of parameter or information that is utilized to decrypt or encrypt a
message in symmetric encryption. In asymmetric key encryption, two keys are used, the first
one is the public key and the other is the secret key (Gaži & Tessaro, 2015). The secret key is
also known as the private key.
In cryptography, a cipher text is the output of encryption that is executed on the
plaintext utilising and algorithm cal, the cipher (Ferguson, Schneier & Kohno, 2015). In
decryption that is the inverse of encryption, is the procedure of turning the cipher text into a
plaintext that can be read by the humans.
Document Page
2PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
The decryption algorithms define the algorithms of key encryption and the data that
are used in order to decrypt the SOAP messages (Subramanyan, Ray & Malik, 2015). The
WSS API for decryption defines the uniform resource identifier of the algorithm of the data
and the techniques of key encryption.
Document Page
3PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
References
Aggarwal, D., Joux, A., Prakash, A., & Santha, M. (2018, August). A new public-key
cryptosystem via Mersenne numbers. In Annual International Cryptology
Conference (pp. 459-482). Springer, Cham.
Barker, E., & Mouha, N. (2017). Recommendation for the triple data encryption algorithm
(TDEA) block cipher (No. NIST Special Publication (SP) 800-67 Rev. 2 (Draft)).
National Institute of Standards and Technology.
Ferguson, N., Schneier, B., & Kohno, T. (2015). Introduction to cryptography. Cryptography
Engineering: Design Principles and Practical Applications, 23-39.
Gaži, P., & Tessaro, S. (2015, April). Secret-key cryptography from ideal primitives: A
systematic overview. In 2015 IEEE Information Theory Workshop (ITW) (pp. 1-5).
IEEE.
Luo, L. (2019). Symmetric cryptography.
Subramanyan, P., Ray, S., & Malik, S. (2015, May). Evaluating the security of logic
encryption algorithms. In 2015 IEEE International Symposium on Hardware Oriented
Security and Trust (HOST) (pp. 137-143). IEEE.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]