Cryptography Techniques in Data Security: A Comprehensive Report

Verified

Added on  2025/08/27

|11
|2358
|364
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
INFORMATION SECURITY
Student Name:
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
According to the author (Hercigonja et al., 2016) cryptography is said to be the most important
part when we are building a secure VPN. The most used technology which helps in the building
of the secure VPN is cryptography as it has the method in which the message can have two
different characteristics, the encryption phase and the decryption phase. According to the author
(Kaur et al., 2017), there are different kinds of the application which generally uses the
encryption and decryption methods in which the message can be encrypted in such a way that it
can be only be decrypted by the receiver only. This will enhance the security feature in that
application. The topic Cryptography techniques are been used because it will have a major role
in maintaining the security of the message sent by the customer or client or user.
Document Page
Contents
Abstract............................................................................................................................................2
Overview..........................................................................................................................................4
Relevant technologies and their applications..................................................................................5
Challenges and problems in cryptography......................................................................................6
Gaps in the literature........................................................................................................................7
Addressed Issues..........................................................................................................................7
Not addressed issues....................................................................................................................8
Views on the issues......................................................................................................................9
Future research directions..............................................................................................................10
Reference:......................................................................................................................................11
Document Page
Overview
According to the author (Hercigonja et al., 2016), the cryptography generally used for the
purpose of data confidentiality. The message confidentiality is being the most important part of
the message receiving and sending. The cryptography uses two different kinds of methods called
Symmetric and Asymmetric cryptography. These are the two methods which can be used to
encrypt the message that is being sent by the sender. This becomes very important to protect the
data, message and this can be done with the help of the Cryptography. Both of these methods use
different techniques through which it can be possible to encrypt the message. The Symmetric
cryptography on the one way can be used by sender and receiver in such a way that a single key
will be used by both of them that will help to encrypt and decrypt the message. The Asymmetric
cryptography on the other side will use another method in which the two keys are being shared
between the sender and the receiver. One key will be used to encrypt the message and another
will be used by the receiver to decrypt the message.
Data privacy provides two types of encryption of the cryptographic algorithm.
ï‚· Asymmetric cryptographic and
ï‚· Symmetric cryptographic
Asymmetric cryptographic is known as a key of public and used to solve the issues of swapping
by 2 types of a key in which it is used to encrypt the message. In this technique, encrypted
messages may be decrypted by the other key.
In cryptography skill, to alter simple material into cypher material and cypher words into simple
text 1 type of key that is top-secret or symmetric key & it is applied for both process of
decryption and encryption
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Relevant technologies and their applications
There are few relevant technologies which can be used to encrypt and decrypt the messages and
help to secure the messages that are being shared between the senders and receivers. Some of
them are listed as: -
1. Homomorphic Encryption: - The very first kind of the method is called as the Homomorphic
Encryption in which according to the author (Martins et al., 2018) the encryption of the data
takes place without decrypting with the help of meaningful calculations or the computations.
Thus, this method helps the user in the area of privacy concern.
Applications: - Retrieving private information is one of those methods in which the data can
be retrieved by the user from N numbers of the records while hiding the identity of the record
from DB operator. Privacy of Genomic Data can be said to be another application of the
Homomorphic Encryption.
2. Moving Target Defense: - Another method which is as similar to cryptography is called as the
moving target defence. In this method the attackers will get a kind of platform blockage
because of which it will not be easy to attack the messages. The power is being shifted to
defenders. Under this method a dynamic and regularly evolving attacker platform is being
created because Applications: - According to the author (Aydeger et al., 2019), this application
will help the user from the attackers in a way that it will create a platform which will refuse the
attackers from attacking. The cloud computing platform called the MOTAG is being protected
with the help of this technique.
3. Honey Encryption: - According to the author (Fun et al., 2017) this is called to be the kind of
data encryption that usually uses a cyphertext key in which there is a rule such that when an
attacker is trying to decrypt the message with an incorrect key as a guess that it will awake the
user or the concerned authority.
Applications: - This method can be used to protect the data that is available or that is stored in
the password manager services. There is an easy way in which the attacker always tries to make
the attack on the password managers. So, with the help of this method or technique, the data
can be stored safely.
Document Page
Challenges and problems in cryptography
The Cryptography came with problems and challenges that need to be resolved in order to
maintain the security and safety of the messages sender and receiver passes between them. Some
challenges can be in the form of like: -
ï‚· There is a myth about the cryptography that is being the most common and the best way
through which security of the messages can be maintained. But it creates a problem
sometimes as the private messages create a problem for the government and the lawmakers.
Because of which in some countries the use of cryptographic methods to connect with anyone
is prohibited.
ï‚· Cryptography faces the problem of the forced disclosure of the keys that are being used for
the purpose of encryption. Sometimes there might be a situation that occurs because of which
the security forces call for the encryption keys.
ï‚· Sometimes there is a problem in making the system better protected with the cryptography.
Some fault in the system which is using the cryptographic method for the encryption and
decryption creates havoc like condition for the system and system manager. A minute
problem in the system can result in the loss of the excretion key of the messages and all of the
data will get used by attackers.
ï‚· Today the method which is using by the system is called as dependent on an apprenticeship as
a mean of way to the practice of secured development which affects the way of producing it.
This will lay down the problem for the coders and coding of the system will be done in a poor
way which will affect the system. The poor coding will let the algorithm to be cracked by the
attackers without any problem.
Document Page
Gaps in the literature
The cryptography definitely said to be the best way to maintain the security and the privacy of
the messages but definitely, this system has some issues that need to manage and control in
order to increase the security and privacy of the data. The different issues are:
Addressed Issues
1. Developers get hacked: - It is said that the RSA algorithm is the best algorithm which
provides security when talking about the asymmetric cryptography. This method or RSA is
used in creating a well know secure and stable connections over the network such as the
VPN authentication, SSH and etc. The main advantage of the RSA algorithm is that it
cannot be easily be hacked. But when talking about the attacks, the RSA faced the most no.
of the attacks in recent years because of which the company was not telling about the
number of hackers attacked the system. The situations become too critical that the keys
were changed by the company and RSA had to replace all the tokens.
2. Using the keys in the wrong way: - There are many issues that have to arise in the
present time where the use of encrypted keys was done in the wrong way. There are many
companies mainly the private companies who take the money and then share the private
keys of the senders. This creates a lot of problem for the users as their keys are being
shared with hackers which can take all the data of the user. There are many countries who
have faced this kind of issues.
3. Changing of keys: - According to the author (Patil et al., 2016), the next problem that is
describing here is the problem of the changing of the keys by the senders and the receivers.
The main problem occurs when the user changes the key of encryption with the receiver
before the message is sending. Although there is a possibility that the sender and the
receiver can exchange the keys with each other but when talking about the safety and the
security this option always fails to do so. So, it becomes very important to change the keys
only when the message is sending as this method is said to be the best way through which
message can remain safe and secure.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Not addressed issues
There are certain kinds of the issues that are not being addressed in the literature review and
these problems are: -
1. Key encryption will be a problem: - According to the author (Ogiela et al., 2016)
cryptography is said to be the best method because of which it will be easy to maintain
the privacy and the security of the message the sender will send and the receiver will
receive. But in the coming time to crack the algorithm called as the key will take billions
calculation need to be done in seconds to extract that. The current computer and
technology will not be going to be enough to solve these kinds of problem.
2. A flaw in the control: - According to the author (Tripathi et al., 2015) the next problem
arises due to the flaw in the access control. The problem arises due to the inappropriate
control check in the certificates on the application or on any of the programs. The
problem is very common because of which sometimes it becomes very easy for the
hackers to hack the system and thus the cryptographic work becomes of no use. So, this
problem is being the biggest problem in cryptography.
3. A flaw in the system: - According to the author (Jirwan et al., 2015) Although it is
important to design a system that can be capable of producing the best results and is safe
to use. The system design always makes in a perfect way but sometimes there is a
problem in the implementation. Due to the error in the implementation by the system
creates a problem and hence it makes hacker easy to hack the system and to utilize it in
the wrong way.
Document Page
Views on the issues
It becomes very important to make a system that can be capable of making the message
sending safe and secure. The issues of the using of the keys by the private companies in the
wrong way should need to be eliminated here. The cryptography is said to be a way through
which it is possible to send the messages from the sender to the receiver. Thus, it becomes
very crucial and important to make these kinds of the system capable of doing all the things
in a safer way. The calculations needed for the process of decryption can take a lot of time.
The computers used to do the billions of the calculations in a second and still it takes a lot of
time for solving. The present technology needs to be strong enough through which it will be
possible to do the calculations in no time.
Document Page
Future research directions
This is always important to make future research so prominent and useful so that it will need to
resolve all the problems that are being faced by the present system. It becomes very important to
make a system that needs to be designed in a perfect way so that it will not affect the
cryptography errors arising in the system. The attackers cannot able to attack the system and thus
the system can remain and becomes free from potential attackers. These are some of the man and
important points that are needed to be focused on and need to be resolved. The encryption and
decryption always become very important to the security point of view and the user have the
kind of satisfaction while using the system. So in this report, everything related to the
cryptographic techniques is being taken into consideration and gives a brief idea about the
cryptographic techniques.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference:
Aydeger, A., Saputro, N., & Akkaya, K. (2019). A moving target defense and network forensics
framework for ISP networks using SDN and NFV. Future Generation Computer Systems, 94,
496-509.
Fun, T. S., Samsudin, A., & Zaaba, Z. F. (2017). Enhanced security for public cloud storage with
honey encryption. Advanced Science Letters, 23, 4232-4235.
Hercigonja, Z. (2016). Comparative analysis of cryptographic algorithms. International Journal
of Digital Technology & Economy, 1(2), 127-134.
Jirwan, N., Singh, A., & Vijay, S. (2015). Review and analysis of cryptography
techniques. International Journal of Scientific & Engineering Research, 4, 1-6.
Kaur, A. (2017). A Review on Symmetric Key Cryptography Algorithms. International Journal
of Advanced Research in Computer Science, 8, 4.
Martins, P., Sousa, L., & Mariano, A. (2018). A survey on fully homomorphic encryption: An
engineering perspective. ACM Computing Surveys (CSUR), 50(6), 83.
Ogiela, L. (2016). Cryptographic techniques of strategic data splitting and secure information
management. Pervasive and Mobile Computing, 29, 130-141.
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation
of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science,
78, 617-624.
Tripathi, R., & Agrawal, S. (2015). Comparative study of symmetric and asymmetric
cryptography techniques. International Journal of Advance Foundation and Research in
Computer (IJAFRC), 6, 68-76.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]