ITC595 Assessment 3: Cryptographic Techniques and Data Security

Verified

Added on  2025/04/28

|3
|394
|56
AI Summary
Desklib provides past papers and solved assignments for students. This report explores various cryptographic techniques.
Document Page
ITC595
Assessment 3
Research Project
Abstract
Topic: Cryptographic techniques
Student Name:
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
This document focuses on the importance of cryptography and its various techniques.
Cryptography is the way of hiding or encrypting message into codes so that no unintended
authority has access of it. Earlier its use is limited to some area like in military services, in
protecting the security of the nation and in giving diplomatic correspondence. But it has
expanded with (Sharma, Prahbjot, and Kaur, 2019, p.323) the advancement in the internet.
Nowadays, they are used to secure the communication, networks, storing data, storing password
and to protect the e-commerce etc.
Cryptography uses complex mathematics to encrypt data into a secret code, which give data
confidentiality, authentication, data integration and non- repudiation. Hence it transmits with
confidentially where no disturbance occurs over the transmission.
It starts its process with plain text- unencrypted data apply algorithms and convert the plain text
in cipher text called as encrypted data. Cryptography mainly depends on two factors: - First, the
total strength contains in the algorithm of cryptography and second, secrecy of any key which
provides confidentiality to data. On the basis of the key cryptography is divided into two parts.
Secret key Cryptography: - this technique only uses an single key for its decryption and
encryption (Symmetric encryption), Public Key Cryptography: - they use 2 keys, one of them for
encryption and another one is for decryption (asymmetric encryption).
Various Techniques used in the cryptography are Mono Alphabetic Cipher, Poly Alphabetic
Cipher (Playfair and Vignere Cipher), Transportation Cipher (Simple Columnar and Rail-Fence
Transportation), and Codebooks. In today’s world (Mitra, et.al. 2017) with more need for
security and to protect the information, Cryptography is becoming more complex so that third
party doesn’t enter in the transmission. And techniques used are Diffie Hellman key exchange,
Data encryption standard (DES), Advanced Data encryption standard and etc.
Cryptography is giving a very secure methodology to protect the information. Many companies
and organisation are using it to secure the data of its company through cryptography.
Document Page
Reference
Mitra, S., Mahapatra, G., Balas, V. E., & Chattaraj, R. (2019). Public Key Cryptography Using
Harmony Search Algorithm. In Innovations in Infrastructure (pp. 1-11). Springer, Singapore.
Sharma, N., Prahbjot and Kaur, H. (2017) A Review of Information Security using Cryptography
Technique, 8(4). 323-326. International Journal of Advanced Research in Computer Science.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]