ITC595 Information Security: Cryptographic Techniques and Challenges
VerifiedAdded on 2024/05/21
|4
|427
|131
Report
AI Summary
This report provides an overview of cryptographic techniques, focusing on encryption and its role in securing confidential communications. It defines key components such as plaintext, ciphertext, encryption, decryption, and cryptographic algorithms, highlighting two main types: single-key and public-key encryption. The report addresses critical security challenges including authentication, confidentiality, integrity, access control, and non-repudiation. The rationale for selecting this topic stems from the increasing volume of data transmission and the heightened vulnerability to attacks in the modern information technology landscape. It references academic works to support its discussion of security issues in SCADA networks and a survey of cryptographic techniques.
1 out of 4