Chapter: 1
Introduction & Literature Survey
In today’s world, recent information technology is mostly based on digital multimedia data. Compared with analog data, digital data has many advantages. Digital media is a huge time saver, which produces lots of digital data in very short time. Computers help transforming analog data into digital forms before storing and/or processing. Computers perform digital computations; they can only work with digital media. Therefore, all analog audio or video media must be converted to digital to work on a computer. In the mean while, the internet develops very fast and hence becomes an important medium for digital data transmission. Computers and the internet are the major communication [4] media that connect
…show more content…
With the rapid full age of networking, transfers the data all over globally in various fields. Digital multimedia consists of audio, video and an image. In many ways digital media is different from analog recorded media. The unique ability of digital media is to easily create, transmit and easily copy the digital media. Also it can be stored, downloaded, streamed on media such as CD or DVD. Digital multimedia used in various fields like Medical, Entertainment, Military, Education, Industries, and also in research field. The capabilities of digital multimedia [2] joined with reducing computer cost, higher bandwidth, easier to use technology, and increase in use of education during the last five years. It becomes easier to copy, edit, and transmit the digital data via internet then problem of threats will be faced. As world is more connected by networking, use of electronics services also increases. So In order to protect the data via communication and in computer from unauthorized users, modifications, faithful data storage and transmission is needed. Users of network all around the world increases rapidly. The reproduction, manipulation and the distribution of digital multimedia (images, audio and video) via networks become faster and easier. If the transmitted data via network is confidential, it is convenient as well for some malicious users to illegally copy, destroy, or change them on …show more content…
It hides the encoded message. This system uses plain text as input and produces cipher text using encryption key.
In the above cryptographic system, secret data which has to be send known as plain text. Encryption algorithm along with secret key applied to the plain text. It will become Encrypted message, known as cipher text. To recover the original data decryption algorithm is applied along with secret key.
Basic requirements of a Cryptographic system are:
1. Authentication: Authentication provides identity to the recipient. Cryptography [1]can also provide authentication for verifying the identity of someone. In traditional digital network communication, a sophisticated checksum, usually known as hash or message digest, is used to authenticate whether the content has been altered or not. The checksum is encrypted using such cryptographic techniques as public-key encryption to ensure that the checksum cannot be generated or manipulated by unauthorized persons. This is known as digital signature in cryptography.
2. Privacy/Confidentiality: Ensuring that the data is not reaching any unintended recipient.
3. Integrity: Ensuring that the recipient is able to extract the content of the decrypt the message in its original
7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?
4) Decoding. The receiver must be able to translate the message so they understand its contents or instruction.
Public key and private is a type of encryption technique that can be used ensuring that the communication on the network is secured. When you sending a message to someone through the network, will need to use the public key of the receiver and the receiver will use the private key to decrypt the message. This encryption will avoid unauthorised access to the message such as reading
When a fellow general received the message, he would wrap the paper around his corresponding scytale to decipher the message (Tyson 2014). Since the advent of computers though, encryption has become increasing important and relies almost solely on cryptographic means to secure information. When speaking about encryption today, it refers more to the process rather than the mathematical formulas used to scramble data. The basic idea behind encrypting a computer message is such that it is scrambled with a sequence of random bits, known as a key, and only parties with the corresponding key can transpose it back into a comprehensible format. These keys are created via a cipher, otherwise known as an algorithm. When a user sends a message, known as the plaintext, across a network, the computer applies an algorithm to the information to encode it, resulting in a ciphertext (Encryption Basics 2014). This method can be best summarized visually:
9. important data such as Albasordat Do not to putting without encryption algorithms used type of One-Way, such as MD5 & SHA1
Most encrypted protocols include a hashing algorithm to ensure no data was altered in transit. This can also help defeat “Man in the Middle” attacks, because by decrypting and re-crypting data, the attacker will alter the signature even if they don’t change any of the key data.
Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily understood by anyone except authorized parties. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play
Data, often referred to as plaintext, is encrypted using an encryption algorithm and an encryption key. This process generates ciphertext that can only be viewed in its original form if decrypted with the correct key. Decryption is simply the inverse of encryption, following the same steps but reversing the order in which the keys are applied (Rouse, 2014).
[5] M. Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.
M2 – Explain the operation and use of encryption technique in ensuring security of transmitted information
Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
Encryption converts data from a readable form to unintelligible text. Only authorized users are able to convert the data back into a readable format. (Sayles & Trawick,
Encryption is one of the most important technologies of cybersecurity designed to protect the confidentiality of data. Encryption uses a complex mathematical formula and a key which randomizes and creates a coded or encrypted message. Only the party that the message or data is originally intended for can read in plain text by using the appropriate key to decrypt the data. Some encryption algorithms such as AES (Advanced Encryption Standard) are very complex
Decryption: decryption is carried out on the receiver side to translate the cipher text into the plaintext with the same key that is used at the sender side.
Encryption is a method of converting plain text to cipher text using some base keys and