Comprehensive Report on Secure Encryption Technologies and Security

Verified

Added on  2024/05/17

|15
|586
|240
Report
AI Summary
This report provides an overview of secure encryption technologies, focusing on certificates, asymmetric and symmetric key algorithms, and encryption strength. It discusses various encryption types, including secret key, public key, and hash key cryptography, along with functions like access control permissions and digital signatures. The report also examines message digest algorithms, public key infrastructure, and outline replay security. Key security threats such as eavesdropping, data interception, and falsification are identified, followed by an explanation of the Transmission Control Protocol and its layers. Finally, the document outlines security issues related to administration, compliance, vulnerability management, and legal aspects, as well as challenges posed by the broadcast nature of wireless communication and limitations in computational power. The report also touches upon wired equivalent privacy, Wi-Fi protected access, and other relevant topics.
Document Page
Implement secure encryption technologies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Certificate
An attachment to an Email utilized for security purposes. The most well-
known method of digital security is the certificate.
[CA] Certification Authority.
[RA] Registration Authority.
[RS] Repository Services.
Document Page
Asymmetric key algorithms
Diffie-Hellman key [DHK]
Rivest Shamir Adleman [RSA]
Document Page
Symmetric key algorithms
[AES] Advanced encryption standard
[DES] Data Encryption Standard
[TDES] Triple Data Encryption Standard
Blowfish
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Encryption strength
An encryption quality is a measure of bits in the
key used for information encoding in SSL. The
greater the number, the more decryption time is
taken by computer for enciphered text .
The strength of encryption depends on the
program and the web-server connected to it.
Document Page
Encryption types
Secret key cryptography
Public key cryptography
Hash Key cryptography
Document Page
Functions and Features of
{ACP} Access control permissions.
{DS} Digital signatures.
One-way encryption and Symmetric and
asymmetric encryption.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Message digest
A message hash work is a cryptographic
method use for private key protection. It
maps a message of subjective length to a
settled length hash value or "message
process".
One-way message digests
{MD5} Message digest algorithm 5.
{SHA} Secure hash algorithm.
Document Page
{PKI} Public key infrastructure.
{PGP} Pretty good privacy.
{GnuPG} GNU Privacy Guard.
Document Page
Outline replay security
A break of security in which data is put
away without approval and after that data
is again transmitted to trap the collector
into unapproved tasks, for example,
confirmation , false ID or a copy exchange.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security threats
1. Eavesdropping
2. Data interception
3. Data corruption
4. Data falsification
5. Authentication issues
Document Page
Transmission control protocol
In this model, conventions are executed inside 4 layers that is
arrange get to, web, transport, application.
System get to layer is actualized for controlling the gadgets like
equipment. It fills in as the physical and OSI show information
interface layer.
The Internet OSI layer is utilized for deciding the route in the
planned system. It is parallel to the OSI organize layer which
handles the exchange of information over the chose or outlined
system.
The OSI Transport layer is otherwise called host to have layer that is
in charge of transmitted errorless information. This layer
incorporates two conventions that are TCP (Transmission Control
Protocol) and (User Datagram Protocol).
The best layer that is application layer is utilized for encoding of
information. This OSI layer is at risk for overseeing UI records and
the correspondence between two hubs is conceivable because of
this layer
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]