University IT Security Presentation: Encryption Techniques (MITS5004)

Verified

Added on  2022/10/09

|8
|455
|95
Presentation
AI Summary
This presentation focuses on encryption techniques within the realm of IT security, specifically exploring Attribute-Based Encryption (ABE) and Key Policy ABE (KP-ABE). The presentation introduces encryption as a crucial security method, enabling authorized access to information through encryption algorithms that generate ciphertext. It differentiates between symmetric and public key encryption, highlighting ABE as a public key cryptography method that employs a one-to-many approach. Furthermore, it delves into KP-ABE, an advanced version of ABE, where decryption relies on user secret keys and predefined policies. The presentation concludes by emphasizing the relevance of encryption techniques in cloud computing, underscoring the importance of key distribution and management to ensure secure data access. The assignment includes references to academic papers that support the concepts discussed.
Document Page
MITS50004 IT SECURITY
(Encryption Technique)
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Content
Introduction
Attribute-Based Encryption
Key Policy ABE (KP-ABE)
Conclusion
References
Document Page
Introduction
Encryption can be defined as the
security method which is designed in a
way that specific and authorized
people can access or read it.
It merely makes use of encryption
algorithm that generates cipher text
that can be read, if and only if it can
be decrypted.
There are mainly kinds of encryption
technique that is symmetric and public
Document Page
Attribute-Based Encryption
ABE is a well-known public key cryptography
which makes use of one to many method. It
generally identifies both encrypting and
decrypting data.
Both the cipher text and secret key completely
depends on the given attributes
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Key Policy ABE (KP-ABE)
KP-ABE stands for key policy ABE which is
updated version of ABE.
In this, decryption for cipher text is only
done if the given attributes the user secret
key.
In this method, a proper policy is assigned
for the cipher text at the time of creation.
Document Page
Conclusion
The point can be noted that the presentation
highlights the use of encryption technique which is
being in cloud computing. ABE stands for
Attributed-based encryption which is new public
key encryption method. This particular technique
works on the basis of single to many. In public key
encryption, most of data is being is stored in the
third party server. The distribution key aims to
authorize the different user. It comes up with many
drawbacks like efficient management of distribution
key to authorized user.
Document Page
References
[1] R., Karmakar, S. Chatopadhyay, and R., Kapur. Encrypt flip-flop: A novel logic
encryption technique for sequential circuits. arXiv preprint arXiv:1801.04961, 2018.
[2] S., Farwa, T., Shah, N., Muhammad, N., Bibi, A Jahangir, and S., Arshad. . An
image encryption technique based on chaotic S-box and Arnold transform. Int. J. Adv.
Comput. Sci. Appl, 8, pp.360-364, 2017.
[3] S., Panghal, S. Kumar, and N., Kumar. Enhanced security of data using image
steganography and AES encryption technique. International Journal of Computer
Applications, 42, 2016.
[4] S., Roy, J., Karjee, U.S. Rawat, and N., Dey. . Symmetric key encryption technique:
A cellular automata based approach in wireless sensor networks. Procedia Computer
Science, 78, pp.408-414, 2016
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]