2173 WordsDec 8, 20169 Pages

Simple Symmetric Protocol
Alice may choose to use the simple symmetric protocol. It requires that Alice and Bob establish a secret key with which the location can be encrypted. The two need to somehow agree upon the secret key in a secure manner- like in a private conversation, for example. The steps to accommodate a secure exchange using a simple symmetric system would be:
1. Alice would type the witness ' location into a simple text file using an editor.
2. Alice would use the Rijndael cipher from the JCE to scramble the text file using the secret key agreed upon with Bob.
3. Alice would send the output of step 2 to Bob using email.
4. Bob reads his email, expecting a scrambled bit of text from Alice, and uses his JCE decryption Java program to descramble the text using the secret key agreed upon with Alice. Bob would now have the location of the witness.
Simple Asymmetric Protocol
In the previous situation Alice and Bob needed to agree upon a secret key for their secure communication in person. However, in most circumstances it is not possible to establish the secret key. In fact, since Alice and Bob live in different countries it is unlikely that physically meeting up with one another is feasible. In these situations asymmetric or public key systems excel.
A public key system works in the following manner: Alice and Bob each have two keys, one of which is secret to themselves and the other which is publicly known. The publicly-known key is registered with a trusted

Related

## Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 PagesKaplan University IT286 Unit 6 Jennifer Polisano Question 6-1: Write a one half page description of the use of substitution ciphers and transposition ciphers. Use the rot13 encoding algorithm to encode the following sentence: It is critical for network administrators to understand cryptography. There are several websites that will encrypt in rot13. Answer 6-1: Substitution ciphers are a method of encryption by which units of plaintext are substituted with ciphertext according

## Holistic Detective Dubh Harshly Needs For Important Photographic Evidence And Confidential Documents

1353 Words | 6 Pagespicture to print (Ted might submit something next week and make this claim… he’s kind of a jerk)? Sending any information over the internet from one machine to another, whether Top-Secret or Grandma’s cookie recipe (high-clearance?), seems like a simple point-and-click affair from the application layer of our computers. However, when information is sent, as in Dubh’s case, we want to know that it is going to the correct place (authentication), in its original form (integrity), and that only the people

## Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 Pagescryptography. 2 Symmetric 2 Asymmetric 2 Operation and Working of Both Methods 3 Ingredients of symmetric encryption 3 Working of symmetric cryptography (Graphical Representation) 4 Ingredients of Asymmetric cryptography 4 Working principal of Asymmetric encryption (Graphical representation) 5 Strengths and Weaknesses of Both 6 Strength of Symmetric Encryption 6 Strength of Asymmetric Encryption 6 Weakness of symmetric encryption 6 Weakness of Asymmetric Cryptography 6 Use of Symmetric and Asymmetric

## Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 Pagesestablishment that was formed after World War. Public key distribution became practical method for establishing a shared secret key over an authenticated communications channel without using a prior shared secret.The keys for encryption and decryption in symmetric methods are the same but in Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is private and one is public,because the key pair is mathematically

## User Friendly Hash Values

1252 Words | 5 Pagesordinary client for saving maintenance cost and storage space. For blocks, the usage of tag authentication Merkle Hash tree construction makes system more complex and slows the process. Merkle scheme has limited number of possible signatures. Thus the question arises, Can Merkle theme can solve the problems generated through modern applications? Thus there exists a doubt to handle integrity of the bulk data. G. Ateniese, R.C. Burns, R. Curtmola, et al. [3] the proposed purpose behind Provable Data Possession

## Final Test Essay

3031 Words | 13 PagesCMIT 321: Ethical Hacking Final Examination This timed final exam will consist of 100 multiple-choice questions, and you will have four hours to complete it. Carefully note the information provided in the yellow box below. An error occurred while attempting to insert your grade into the WebTycho Gradebook. Your instructor has been notified to insert the grade manually. No further action is required on your part. Your answers to this activity have been submitted to your instructor. You may review

## Application For Scalable Data Sharing Essay

1965 Words | 8 PagesMoreover, the end users‟ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. Cloud storage should be able to store and share data securely, efficiently, and flexibly with others in cloud storage. The

## Annotated Bibliography On Web Security

1613 Words | 7 Pageswill discuss the historical background on the objectives of Web services and security,and it will be touched upon the other subjects such us Confidentiality, integrity, authenticity services, authentication methods, Zero-Knowledge Proof protocols, and Diffie-Hellman key exchange is also discussed. 2.2 Web Security Goals We can say that the data and sensitive information that is sent over computer network be vulnerable to attacks by hackers. This information should be protected

## Database Security and Encryption: A Survey Study

3964 Words | 16 Pagesfor general classification of the submitted material such as Pattern Recognition, Security, Algorithms et. al. Keywords Database Security Database, Security, Encryption, Access Control. 1. INTRODUCTION We ask that authors follow some simple guidelines. In essence, we ask you to make your paper look exactly like this document. The easiest way to do this is simply to download the template, and replace the content with your own material. Information or data is a valuable asset in any

## Cryptography : Using Encryption Decryption Technique

2886 Words | 12 Pageskey cryptography: There are many Cryptography algorithms available such as • Secret key cryptography • Hash functions • Three encryption techniques Public key cryptography is one of the important cryptography algorithm and a class of cryptographic protocol. It is more significant algorithm used for secured communication over the other algorithms. It was published by Stanford University Professor named as “Martin Hellman” in 1976. It is basically a two-key crypto system with the use of this system two

### Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 Pages### Holistic Detective Dubh Harshly Needs For Important Photographic Evidence And Confidential Documents

1353 Words | 6 Pages### Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 Pages### Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 Pages### User Friendly Hash Values

1252 Words | 5 Pages### Final Test Essay

3031 Words | 13 Pages### Application For Scalable Data Sharing Essay

1965 Words | 8 Pages### Annotated Bibliography On Web Security

1613 Words | 7 Pages### Database Security and Encryption: A Survey Study

3964 Words | 16 Pages### Cryptography : Using Encryption Decryption Technique

2886 Words | 12 Pages