Analysis of Cryptosystem Implementation in the Modern Industry

Verified

Added on  2023/06/11

|5
|760
|132
Report
AI Summary
This report delves into the application of cryptosystems within the modern industry, focusing on the critical aspects of data security and privacy. It begins with an introduction outlining the current challenges related to data protection and the role of cryptography in addressing these concerns, specifically within the travelling industry. The report then provides a historical overview of cryptosystems, tracing their evolution from ancient times to modern implementations, along with a historical perspective on the industry. It examines the current links between cryptosystems and industry types, emphasizing the importance of robust key management processes to prevent unauthorized access to sensitive data. The report also acknowledges the limitations of cryptosystems, such as potential issues during emergencies, high availability concerns, and the costs associated with implementation. The conclusion summarizes the significant benefits of cryptography in enhancing security and services within the travelling industry, highlighting its contribution to the ongoing development of the market. References to several research papers are included to support the claims made throughout the report.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cryptosystem in Modern Industry
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction......................................................................................................................................3
Background......................................................................................................................................4
A. Historical Overview of Modern Cryptosystems.....................................................................4
B. Historical Industry Overview..................................................................................................4
C. Current Link between Modern Cryptosystems and Industry Type.........................................4
D. Limitations..............................................................................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................7
Document Page
Introduction
A. Current problem: Privacy and security of data has been major concern of any organization all
over the world. Cryptography is a technology that helps in binding up the data and information
that have been to be sent from receiver to sender (Kraft & Washington, 2018). This report
discusses about various cryptography evidences in the travelling industry.
B. Areas of Focus: A solid key administration process is basic to forestall unapproved access to
delicate data.
C. Thesis Statement: The selection of the topic “Cryptosystem in modern Industry” is to research
on much more on the topic to make cryptosystem more reliable and useful for the modern
industry and to keep data safe.
D. Key Terms: Cryptography, Web security, Travelling Privacy
Background
A. Historical Overview of Modern Cryptosystems
In ancient times, privacy and security has been a normal phenomenon for sending data
from receiver to sender. Cryptography has not gained too much attention in the market for
securing data and information.
B. Historical Industry Overview
It was named after Julius Caesar who is answered to have utilized it, with a move of 3, to
speak with his officers amid his military crusades, much the same as EXCESS-3 code in Boolean
variable based math. There is record of a few early Hebrew figures too (Icart & Coron, 2017).
Document Page
C. Current Link between Modern Cryptosystems and Industry Type
Cryptosystems are effective apparatuses, yet they are not the last response to the dangers
identified with security. Current calculations are strong to the point that aggressors normally
center their endeavors on getting a duplicate of a key utilized for unscrambling (Mirhosseini et
al., 2015). After a cryptosystem has been chosen and executed, it is basic that clients see how to
defend their encryption keys (Katz & Lindell. 2014).
D. Limitations
There are various limitations of the cryptography. Some of them are mentioned below:
A highly secured with digital cryptographic systems create problem during emergency
times even with the authentic user (Bennett & Brassard, 2018).
High availability has been another limitations as methods required for securing against
threats and risks for complete breakdown of information system.
Selective access control needs to be implemented in the cryptography systems for
securing data and information.
Cryptography is a costly services provided to a company in travelling industry (Kosba et
al., 2016).
Conclusion
It can be concluded that cryptography has been creating great boon in the security and
services. Therefore, it has providing several security tips to the companies in the travelling
industry further development in the market.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin
tossing. Theor. Comput. Sci., 560(P1), 7-11.
Icart, T., & Coron, J. S. (2017). U.S. Patent Application No. 15/671,064.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain
model of cryptography and privacy-preserving smart contracts. In Security and Privacy
(SP), 2016 IEEE Symposium on (pp. 839-858). IEEE.
Kraft, J., & Washington, L. (2018). An Introduction to Number Theory with Cryptography.
Chapman and Hall/CRC.
Mirhosseini, M., Magaña-Loaiza, O. S., O’Sullivan, M. N., Rodenburg, B., Malik, M., Lavery,
M. P., ... & Boyd, R. W. (2015). High-dimensional quantum cryptography with twisted
light. New Journal of Physics, 17(3), 033033.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]