ITTS 266 Adonon-PROJECT PAPER
.docx
keyboard_arrow_up
School
ECPI University, Newport News *
*We aren’t endorsed by this school
Course
ENTD266
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
15
Uploaded by DukePenguinMaster345
CRYPTOGRAPGY CONCEPT
1
Project Paper
American Military University
Professor: Dr Yongge Wang
ISSC 266 Cryptography concepts
CRYPTOGRAPGY CONCEPT
2
Abstract
Over several years, cryptography has proven to be an indispensable tool for ensuring the safety
of sensitive data. Describing cryptography is important so readers and users can completely
understand its objective and operation. This method's significance in modern life will be shown
by detailing its background and present applications. In order to prove that the technologies used
really do safeguard the data they are applied to, it will be necessary to observe the algorithms in
motion. Finally, showing that there are still risks, both known and unknown, despite the progress
gained in cryptography emphasizes the significance of using cryptographic techniques. This
paper will discuss the current definition of cryptography, the language and terminology used in
the field, the application of cryptographic measures, the variety of algorithms used to perform
cryptographic tasks, and the potential dangers in this area of study. This paper will assemble
evidence from various sources to demonstrate how and why cryptography is an important aspect
of overall data protection.
CRYPTOGRAPGY CONCEPT
3
The practice of cryptography, or the creation and decipherment of secret codes, is a crucial part
of modern data protection. The use of this technology protects information while it is in transit,
at rest, and while being accessed by authorized parties. The use of cryptography dates back
millennia and has been used for a wide variety of services, including the dissemination of
military and political strategies and the protection of sensitive information. Unfortunately,
most people today are unaware of the myriad ways in which cryptography is used to safeguard
information, such as messages, passwords, and financial details. The reader will better
understand the significance of cryptography if they are familiar with its concept, typical
applications, security-providing algorithms, and potential risks. The inclusion of cryptography in
your information security strategy is crucial for protecting the privacy, authenticity, and
accessibility of your data. The term "cryptography," which originated from the Greek word Kryptos refers to the study of
methods for keeping communications private (National Research Council et al., 1996). An
Egyptian scribe's usage of non-standard hieroglyphs in an inscription is the first instance of their
appearance in written history. Experts agree that the early uses of cryptography were for military
and diplomatic communications; therefore, it is not surprising that the technique emerged not
long after the invention of writing (Kessler, 2020).
It is not strange that encryption is used to protect sensitive data in the modern world. However,
since cryptography alone cannot guarantee the safety of sensitive data, it is often used in tandem
with additional security measures to provide the appropriate level of protection (National
Research Council et al., 1996).
Encryption, decryption, keys, plaintext, ciphertext, and algorithms are all terminology that comes
up in discussions about cryptography. As the name suggests, plaintext is the unencrypted version
CRYPTOGRAPGY CONCEPT
4
of a message transcribed by algorithms. Ciphertext is the information that has been encrypted but
is still readable without the key. In order to decrypt the ciphertext, a key must be employed. This
key might be a phrase, a password, or a series of digits. Deciphering is the process of converting
ciphertext into plaintext, which may then be read by the intended recipients (Kessler, 2020).
Nowadays, with all the advanced technology available, cryptography is used in just about every
facet of human communication and daily life. Network security, computer system security, and
information security are only a few of the newer areas of use for what was originally developed
for military and political purposes (National Research Council et al., 1996). Since the encryption
and decryption process no longer needs the user to possess a secret key, it has found widespread
application in almost all areas where technology is used today. Typical cryptography applications
include financial transactions, electronic communication, data storage, and many more (Kessler,
2020). While the average user would never understand how cryptography works, it is essential
for anybody working in the field of information security to have some familiarity with the
subject. When it comes to providing security, cryptography's strong suit is the size and structure
of its keys and corresponding algorithms. If the key is long enough, it will be more difficult for
an attacker to use it in a brute-force assault, in which they try every conceivable key until the
encryption is cracked and the data can be seen in plaintext. Cryptography relies on a bigger key
size and mathematical procedures to overcome these frequent assaults. It would take around 11.5
days to crack a key that's 40 bits long, but it would take about 2,000 years if the key were 56 bits
long (National Research Council et al., 1996). There is a clear correlation between key length
and security against brute-force assaults. In general, cryptography serves five purposes. First, there is confidentiality, which ensures that
no one except those authorized to see the information may access it in any way. The second part,
CRYPTOGRAPGY CONCEPT
5
authentication, verifies the identity of the data viewer to ensure that they are really who they say
they are. Third, we must guarantee the file's integrity by ensuring it has not been tampered with
en route. The next step is nonrepudiation, which verifies that the sent file was indeed the one
received. Last, we will go over key exchange, which is the transfer of cryptographic keys from
sender to receiver (Kessler, 2020). In the following sections, we will break them down
into numerous constituent parts.
One of cryptography's most obvious and widespread applications is facilitating private and
confidential communication. Most of the time, this is used without either the sender or the
recipient realizing what is happening. The most obvious use of private communication would be
between an email client and its email server or between a web server and a web browser. The use
of cryptography guarantees that the contents of these communications and records cannot be read
by anybody who is not authorized to do so. Most major corporations use the safe, encrypted
HTTPS prefix for their websites (Chamberlain, 2017).
Cryptography is also often used in the context of data storage. This is because everyone
nowadays collects massive quantities of data, and this information is useful to someone, even if
it's just the originator. Operating systems encrypt data at rest while stored on a computer to
protect user credentials and guarantee the integrity of software updates and
patches (Chamberlain, 2017). BitLocker and EFS are two of the built-in encryption methods in
Windows that keep sensitive information safe from prying eyes (Windows 10 Encryption
Strategies, 2017).
Like data storage, password storage uses cryptography to ensure the security of the stored
information. In the event that passwords are saved in plaintext, an attacker might potentially get
access to any data or software those credentials are used to access. Therefore, passwords should
CRYPTOGRAPGY CONCEPT
6
not be stored in plaintext on a computer since doing so makes it easier for a malicious actor to
access the information. However, they may be made more secure by using encryption. Hashing is
the most effective approach for this kind of storage since it enables the computer system to verify
the password's authenticity without disclosing the plaintext password (Chamberlain, 2017).
Time stamping also employs the usage of cryptography. This process verifies that certain
information really existed or was sent at a given time and date. Without revealing the message to
the receiver beforehand, a blind signature mechanism is employed to generate the time stamp
and provide a receipt of the delivery time. One may compare this to the practice of mailing a
registered letter, in which the recipient's signature attests to the letter's timely delivery. This is
standard procedure when dealing with copyright documentation, legal agreements, and patent
filings (Prashanth, 2019).
In many cases, people no longer exchange cash for purchases; instead, they use electronic
money.
When we talk about electronic money, we often mean things like direct deposits,
cryptocurrencies, and digital gold currency, all of which are traded through EFT. Electronic
funds transfer (EFT) is the use of computers to move money between financial accounts. For
example, billions of dollars are exchanged daily using these methods, which include online
payment, debit and credit cards, ATMs, online transferal, and other virtual ways, such as PayPal.
For all of these deals, we turn to cryptography and a variation on the cryptographic signature
developed by Dr. Davis Chaum: the blind signature. This particular signature method is ideal for
those who like to keep their digital currency transactions private and untraceable (Uses Of
Cryptography | Chapter No. 4 | Fasttrack To Cryptography, n.d.).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Is the use of encryption going to turn into a part of the usage of biometrics at some point in the future? How significant is the role that cryptography plays in the evolution of biometric technologies?
arrow_forward
What are the strength and weaknesses of Elliptic Curve cryptography algorithms? What is the main principle (idea)? When was it discovered
arrow_forward
Because of recent developments in cryptanalysis, there has been a rise in the use of quantum computing. Reviewing and comprehending three to five current papers on the use of quantum computing to the process of password cracking is recommended. It would be reasonable to do a research of one to two pages on the positive and negative aspects of quantum computing.
arrow_forward
Is the use of encryption going to become a component of biometrics at some point? To what extent does cryptography contribute to the development of biometric technologies?
arrow_forward
Is the generation of secret keys for use in cryptographic protocols using software on a desktop computer possible while maintaining the necessary level of security?
arrow_forward
In its infancy, cryptography based on public keys struggled to overcome the difficulty of key distribution. Why not provide an example to illustrate how the distribution of keys might be carried out such that it is clear and simple?
arrow_forward
not copy but own
Asymmetric encryption methods, such as those used in public key cryptography, provide many benefits. What is the process by which the public key encryption is implemented?
arrow_forward
Propose new methods for cryptanalysis and key recovery.
arrow_forward
What exactly does "privacy" entail in terms of protecting sensitive information?
Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?
arrow_forward
The primary goal in developing public key cryptography was to find solutions to two basic problems. The first of these problems was key delivery. It would be helpful if you could provide a brief illustration of how the distribution of keys may be carried out.
arrow_forward
Cryptography's standard for digital signatures (DSA) is used as the basis for the DSA algorithm, which is discussed here.
arrow_forward
The issue of key distribution was one of the most fundamental issues that public key cryptography set out to resolve.Could you provide us with a brief summary?
arrow_forward
What exactly is the role of cryptography with a secret key?
I'd appreciate it if you could provide a brief explanation, such as an illustration of how the system used to work.
What kinds of experiences do you currently have with it?
arrow_forward
The creation of public key cryptography was driven by the need to address two fundamental issues, the first of which is key delivery. Use an example to briefly demonstrate how key distribution may be performed.
arrow_forward
How does "authenticated encryption" combine confidentiality and authentication in cryptosystems?
arrow_forward
Explain the principle of zero-knowledge proofs and their application in cryptographic systems.
arrow_forward
What are the challenges and considerations in "key rotation" for cryptographic systems?
arrow_forward
Search the internet for the article titled "Announcing the Advanced Encryption Standard (AES)". It is recommended that this FIPS 197 standard document be read. Draft a synopsis of the design and implementation processes that went into creating this cryptosystem.
arrow_forward
Explain the concept of a "zero-knowledge proof" in the context of public key cryptography and its implications for authentication.
arrow_forward
Is the practise of email encryption considered ethically acceptable by professionals in the field of information technology?
arrow_forward
Highly recommended are asymmetric encryption techniques, such as public-key cryptography. This is evidenced by the utilisation of public keys in cryptography.
arrow_forward
Using asymmetric encryption methods, such as those found in public-key cryptography, is a prudent move that should be taken. The use of public keys within the realm of cryptography is proof of this fact.
arrow_forward
Cryptography involves five important concepts, integrity, confidentiality, authentication, non-repudiation, and digital signatures. Please describe the technical process, in detail, that involves sending an encrypted email from a sender to a receiver. Be sure to include and describe the technical details for each of the five concepts and the cryptography that takes place. (i.e SHA, AES, RSA, etc.). Please include in our discussion what the difference between a hashing algorithm and an encryption.
arrow_forward
The need to find solutions to two significant problems served as inspiration for the development of public key cryptography, the first of which was the problem of key distribution. Explain the process of key distribution in a nutshell by providing an example of how it might be carried out.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Is the use of encryption going to turn into a part of the usage of biometrics at some point in the future? How significant is the role that cryptography plays in the evolution of biometric technologies?arrow_forwardWhat are the strength and weaknesses of Elliptic Curve cryptography algorithms? What is the main principle (idea)? When was it discoveredarrow_forwardBecause of recent developments in cryptanalysis, there has been a rise in the use of quantum computing. Reviewing and comprehending three to five current papers on the use of quantum computing to the process of password cracking is recommended. It would be reasonable to do a research of one to two pages on the positive and negative aspects of quantum computing.arrow_forward
- Is the use of encryption going to become a component of biometrics at some point? To what extent does cryptography contribute to the development of biometric technologies?arrow_forwardIs the generation of secret keys for use in cryptographic protocols using software on a desktop computer possible while maintaining the necessary level of security?arrow_forwardIn its infancy, cryptography based on public keys struggled to overcome the difficulty of key distribution. Why not provide an example to illustrate how the distribution of keys might be carried out such that it is clear and simple?arrow_forward
- not copy but own Asymmetric encryption methods, such as those used in public key cryptography, provide many benefits. What is the process by which the public key encryption is implemented?arrow_forwardPropose new methods for cryptanalysis and key recovery.arrow_forwardWhat exactly does "privacy" entail in terms of protecting sensitive information? Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?arrow_forward
- The primary goal in developing public key cryptography was to find solutions to two basic problems. The first of these problems was key delivery. It would be helpful if you could provide a brief illustration of how the distribution of keys may be carried out.arrow_forwardCryptography's standard for digital signatures (DSA) is used as the basis for the DSA algorithm, which is discussed here.arrow_forwardThe issue of key distribution was one of the most fundamental issues that public key cryptography set out to resolve.Could you provide us with a brief summary?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education