A Comprehensive Report on Cryptographic Techniques and Security

Verified

Added on  2021/06/17

|6
|1264
|132
Report
AI Summary
This report provides an overview of cryptography and its role in computer security. It begins with an introduction to the concept of security and its evolution, highlighting the increasing importance of cryptography in protecting data from various threats. The report then delves into the core principles of cryptography, explaining how it transforms readable data into an incomprehensible format to ensure confidentiality and security in communication and data storage. Furthermore, the report explores various security threats associated with cryptography, including viruses, worms, Trojans, and rootkits. For each threat, the report outlines preventive measures and countermeasures such as using antivirus software, updating security patches, and being cautious about downloading software. The document concludes by emphasizing the importance of staying informed and proactive in the face of evolving cyber threats.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cryptographic techniques
Student’s name
Institution Affiliation(s)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cryptography and Computer Security
Introduction
Security in the general context refers to protect anything from getting stolen or damaged.
Likewise, computer security relates to the security and protection of the computer data and
information (ITL Education Solutions, 2012). The first example of computer security can be seen
when the computerized switchboard was introduced to protect hardware from external damage in
1976. Then protection was developed to safeguard remote computing, and this was done by
establishing the modem. In the 1980’s another problem arose when personal computers were
designed, this also brought an introduction to the internal issues, i.e., virus from which the PC
needed protection. Matters continued to emerge, but the most severe problem came with the
introduction of the internet. Internet gave rise to many questions because the internet gave rise to
many virtual access points. Access points are an entrance to every sort of information and along
with the information that enters virus and other malware can easily join (Stinson, 2016). This
opened a gateway to many virus and unwanted material into the computer. To protect the
network from such threats many techniques and methods were adopted, and up till now new
techniques and soft wares are being developed to protect the system. One such way of protecting
data is cryptography. It was used to convert readable data into data that cannot be understood. In
the earlier years cryptography was used to protect and secure information and messages between
essential personnel, but gradually encryption began to be used for the protection and safety of all
sorts of communication and safe computing (Stinson, 2016).
Document Page
Cryptography
Cryptography has generally been used widely, and there are some keys that are written for the
public, and the primary reason is to protect the data that is being transferred that is why it usually
remains a secret or a matter of confidentiality between the receiver and the sender. It is a matter
of great concern for the government and especially the law enforcing agencies when the data is
encrypted as they need to be better equipped with programs and software to be counter the
encrypted data and be able to read it (Anderson & Rane, 2017). This is the sole reason that
previously there was such a hue and cry with relations to the matter of privacy. It was discovered
that no mail or communication was hidden from them. They had super software and
supercomputers to help them decode the algorithms and be able to decipher it.
Cryptography is the process of transforming a text that is apparently into the incomprehensible
format. Business enterprises predominantly use encryption during their storage and transmission
of messages carefully for reading by the intended recipients (Buchanan, 2017). Cryptography has
several applications and methods. In the past, it was used in assuring secrecy. The authenticity of
the sender and integrity of the media were secured through the use signatures, wax, and other
physical attributions. However, the introduction of electronic transfer transformed the use of
cryptography into electronic cash. This led to the emergence of debit and credit cards whose
applications have since become widespread. This age of information has witnessed the
development of cryptography a significant protection method of applications (Dooley, 2013).
Document Page
Security threats associated with Cryptography and countermeasures
(i) VIRUSES
They are one of the most common forms of infections that appear in the system. They had earlier
become common thorough floppies, but now newer sophisticated means have been found and
developed. Today they can enter the system through the use of the internet. They are usually in
the form of an executable file, that when run copies itself over and over again and infects the
programs (Gollmann, 2011). The virus is also transmitted through flash drives and emails as
well.
PREVENTION - The system can easily be protected by using an antivirus program that has an
active database of viruses this way the virus can be detected as soon as it enters. The most
straightforward solutions for viruses are the antivirus software. For example Norton Antivirus,
Avira Antivirus, etc. Also, be careful in using the flash drives unprotected can also cause the
virus to expand.
(ii) WORMS
They are also a variation in the kind of virus. Viruses usually come from some external source,
but the worms are transmitted through a network (In Blythe, 2013). Once transferred the worms
exploit the security holes that might exist in the network and load the system process by running
as a separate process. This way the extra burden on the processor causes the system to crash.
PREVENTION - The best way to protect the system from worms is to update the system with
the security patches; this way the worm will not have a chance to attack the system. Also
antivirus and antimalware software help but they are not very useful in preventing the attacks.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
(iii) TROJAN
Trojan is a program that looks desirable and entices the user to install it, once installed it releases
worms and viruses which infect the files and data stored on the system (Kim, 2016). They are
usually deceptive downloads that the user unknowingly downloads. Also many a times spyware
are attached to Trojans who then lodge themselves into the system making the system
malfunction.
PREVENTION - To have anti-spyware software installed in the system prevents the advent of
Trojans and also being careful while downloading unlicensed software can help stop the invasion
by Trojans.
(iv) ROOTKITS
Rootkits are software that is very difficult to be located by any phishing software. They run as a
legitimate system process and are tough to be found out (Oppliger, 2011).
PREVENTION - By knowing the proceeds that are currently running, a user can identify the
rootkit and get rid of it. But the only other way is to reinstall the operating software.
Document Page
References
Anderson, & Rane. (2017). Cryptography. Turtleback Books.
Buchanan, W. (2017). Cryptography. Aalborg: River Publishers.
Dooley, J. (2013). A brief history of cryptology and cryptographic algorithms.
Gollmann, D. (2011). Computer security. Chichester, West Sussex: Wiley.
In Blythe, J. (2013). Financial Cryptography and Data Security: FC 2012 Workshops, USEC
and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. New
York: Springer.
ITL Education Solutions. (2012). Cryptography and network security. New Delhi: Dorling
Kindersley (Indian)/Pearson.
Kim, K. (2016). Cryptography: A New Open Access Journal. Cryptography, 1(1), 1.
doi:10.3390/cryptography1010001
Oppliger, R. (2011). Contemporary cryptography. Boston: Artech House.
Stinson, D. R. (2016). Cryptography. Place of publication not identified: Crc Press.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]