ITC595 Information Security: Cryptographic Techniques and Challenges

Verified

Added on  2024/05/21

|4
|427
|131
Report
AI Summary
This report provides an overview of cryptographic techniques, focusing on encryption and its role in securing confidential communications. It defines key components such as plaintext, ciphertext, encryption, decryption, and cryptographic algorithms, highlighting two main types: single-key and public-key encryption. The report addresses critical security challenges including authentication, confidentiality, integrity, access control, and non-repudiation. The rationale for selecting this topic stems from the increasing volume of data transmission and the heightened vulnerability to attacks in the modern information technology landscape. It references academic works to support its discussion of security issues in SCADA networks and a survey of cryptographic techniques.
Document Page
ITC595- INFORMATION SECURITY
ASSESSMENT 3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Abstract.......................................................................................................................................................2
Overview.................................................................................................................................................2
Challenges involved regarding the security issues in this research area are as follows:...........................2
Reason to select the topic........................................................................................................................3
References...................................................................................................................................................3
1
Document Page
Abstract
Overview
The topic of research is Cryptographic technique. Cryptography is an encryption technique for
communicating the confidential messages. Encryption can be described as molding the information to be
communicated so that it can be read by no other than the recipient.
Components-
Plain text- Original text
Ciphertext- Unreadable text
Encryption- Conversion process (plain to cipher)
Decryption- Conversion process (cipher to plain)
Cryptographic Algorithm- Mathematical formulas
Types
Single key: This encryption uses the same key for both the processes- encryption as well as
decryption. This assures that no third party could decipher the information.
Public key: This encryption confirms a secure transmission of the information without private key
(Vinay M. Igure, Sean A. Laughter and Ronald D. Williams,2006).
Challenges involved regarding the security issues in this research area are as
follows:
1. Authentication: The authentication is a challenge for identifying the individual.
2. Confidentiality: The techniques should ensure that the message is received by the intended user.
3. Integrity: The techniques should ensure that the message’s integrity should not be affected wile
transmission.
4. Access Control: The resources should be available to authorized people.
5. Non-repudiation: It should be ensured that the sender does not refuse to claim his own message
(Dr. Vivek Kapoor and Sandeep Verma, 2014).
2
Document Page
Reason to select the topic
The topic of research has been selected because the volume of data that is being transmitted with the
advancement of information technology has been increased with folds. Therefore, the vulnerability to
massive attacks has been increased. Also, my personal interests are vested in this topic with made me
choose this topic for further researches.
References
Igure, V., Laughter, S., & Williams, R. (2006). Security issues in SCADA networks. Computers
& Security, 25(7), 498-506. http://dx.doi.org/10.1016/j.cose.2006.03.001
Kapoor, V., &Verma, S. (2014). A survey of various Cryptographic techniques and their
Issues.International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET), Vol 3 Issue 12.
3
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]