Principles and Methods in Cryptographic Security: Analysis

Verified

Added on  2022/09/12

|12
|646
|11
Homework Assignment
AI Summary
This assignment delves into the principles and methods of cryptographic security, focusing on several key algorithms and concepts. It begins with an overview of the Advanced Encryption Standard (AES), a symmetric block cipher used by the US government for classified information, and contrasts it with the older Data Encryption Standard (DES), a symmetric key method now considered outdated. The assignment then explores 3DES, an algorithm that applies the DES cipher three times, providing increased key size and enhanced security. It also discusses the working of DES, including its key size and encryption process. The assignment further addresses the future of 3DES, including its deprecation by NIST. The concept of Nonce, an arbitrary number used only once in cryptographic communication for authentication, is explained. Finally, the assignment covers the Key Distribution Center (KDC), which is a crucial component in access control systems that supplies session and access keys, validating requesting users through cryptographic techniques. References are provided. This assignment is available on Desklib, a platform that provides AI-based study tools.
Document Page
Name of Student:
Name of University:
Author Note:
Principles and Methods in Cryptographic Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advanced Encryption Standards (AES)
The AES is block cipher that is symmetric.
It is chosen by the government of US
The AES protects information that are
classified (Kumar & Rana,2016).
It is implemented in hardware and
software
Document Page
Data Encryption Standards (DES)
The DES is a symmetric key method that
is outdated.
The DES uses same keys in order to
decrypt and encrypt a message
(Aljawarneh & Yassein,2017).
In DES, private key is used.
Document Page
3 Data Encryption Standards (3DES)
3DES is a kind of computerized
cryptography.
The algorithms of block ciphers are
applied three times (Patil et al.,2016).
The size of key in increased.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Working of DES
DES works by the encrypting group of 64
bits of message.
It uses keys that are 16 hexadecimal
numbers long.
Every 8th key bit is ignored
The key size is 56 bits (Sharma &
Garg,2016).
Document Page
Why 3DES is now used?
The triple DES algorithm is now used in
place of DES and AES.
This algorithm utilizes the DES cipher
three times in order to encrypt data.
3DES is used nowadays because of small
length of key of DES.
Document Page
Future of 3DES
According to NIST, the 3DES is officially
being retired.
3DES is deprecated for all the applications
that are new.
The usage of 3DES is not allowed after
2023.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Number of independent keys
According to the question, three keys are
present k1, k2, k3 and k1=k3. The number
of independent keys present are k1 and
k2. This provide less security due to
56*2= 112 keys, but this is stronger than
double DES.
Document Page
Nonce
Nonce is a number that is arbitrary.
It can be utilized just once in
cryptographic communication.
It is a random number provided in a
protocol of authentication(Bellare &
Tackmann,2016).
Nonce cannot be reused in replay attacks.
Document Page
Key Distribution Center
It is a component in a system of access
control
It supplies session keys and access keys
Uses techniques of cryptography validate
requesting users (Han et al.,2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Kumar, P., & Rana, S. B. (2016). Development of modified AES algorithm for data
security. Optik-International Journal for Light and Electron Optics, 127(4), 2341-
2345.
Aljawarneh, S., & Yassein, M. B. (2017). A resource-efficient encryption algorithm
for multimedia big data. Multimedia Tools and Applications, 76(21), 22703-22724.
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive
evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia
Computer Science, 78, 617-624.
Sharma, M., & Garg, R. B. (2016). Comparative Analysis of Block Key Encryption
Algorithms. International Journal of Computer Applications, 975, 8887.
Bellare, M., & Tackmann, B. (2016, May). Nonce-based cryptography: retaining
security when randomness fails. In Annual International Conference on the Theory
and Applications of Cryptographic Techniques (pp. 729-757). Springer, Berlin,
Heidelberg.
Han, Q. I. U., Meikang, Q. I. U., Zhihui, L. U., & Memmi, G. (2019). An efficient key
distribution system for data fusion in V2X heterogeneous networks. Information
Fusion, 50, 212-220.
Document Page
THANK YOU
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]