Cryptography Essay

572 words - 3 pages

Symmetric Cryptography
Secret writings have been found in many civilizations dating back to thousands of years where wide spread writings were adopted. Some of these civilizations included the Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and decrypt the ciphertext. With a more contemporary look at symmetric key encryption with computer data, we can classify it into two categories called block ciphers and stream ciphers. The data in a block cipher would be broken down into specific sizes, for example 64-bit blocks or 128-bit blocks, which then the blocks would be encrypted separately. In stream ciphers, data would be encrypted in a stream of bits as oppose to dividing the data into ...view middle of the document...

Unlike symmetric encryption, which is considered to be a very efficient, asymmetric tends to be very resource intensive because it takes a substantial amount of processing power to encrypt and decrypt data. Although asymmetric cryptography is considered inefficient when dealing with large amounts of information, it could be used for non-repudiation so that it would prevent a party from denying an action. Non-repudiation or identity authentication was not built into the symmetric encryption technology, therefor it is vulnerable to modification of data if the key falls into the wrong hands. Asymmetric cryptography does solve an immense problem with symmetric cryptography in that transmitting or exchanging the cryptographic keys are no longer necessary. Key management plays a vital role in all of cryptosystems. According to Martin (2012), “Without secure procedures for the handling of cryptographic keys throughout their lifecycle, the benefits of the use of strong cryptographic primitives are potentially lost” (p. 326).
Protocols with Asymmetric Cryptography
Some of the protocols used today that uses asymmetric cryptography include Secure Sockets Layer or SSL and Transport Layer Security or TLS. SSL is mainly used to encrypt internet traffic, is a certificate-based authentication, and uses both symmetric and asymmetric encryption during a session. In both of these protocols, asymmetric encryption is use to share the symmetric key, which is then used to encrypt the session data. TLS was created as a replacement to SSL and is used in many applications such as HTTPS for encryption (Gibson, 2011). Another popular standard used to digitally sign and encrypt email is Secure/Multipurpose Internet Mail Extension or S/MIME, which uses RSA for asymmetric encryption and AES for symmetric encryption (Gibson).

References
Gibson, D. (2011). CompTIA Security+: Get Certified Get Ahead SYO-301 Study Guide. North Charleston, SC: CreateSpace.
Martin, K. (2012). Everyday Cryptography: Fundamental Principles & Applications. Oxford, NY: Oxford University Press Inc.

Other Essays Like Cryptography

Public-Key Cryptography Essay

950 words - 4 pages Information Security overview for Managers and policy Makers ITM517 Module 5 Case Study Public-key cryptography March 6th, 2013 Introduction Cryptography is the study of protecting information through the use of codes and ciphers. Cryptography forms a fundamental part of message security. At its simplest form, is a process of methodically changing information to make it unreadable without knowing how that information was changed. One of

Modern Cryptography Research Paper

1553 words - 7 pages CS 6903 - Applied Cryptography Lecture 10: Lecture 10, slides 3-15 Speaker: Giovanni Di Crescenzo, Scribe: Chaitanya Bhorade December 13, 2014 Summary: This document contains notes for Lecture 10, slides 3-15. These are the lecture notes with some additional information by the scribe, for Lecture 10 Slides 3- 15. The primary focus is on Digital Signatures and its constructions. Properties of a digital signature is then discussed. This is

Full Time

1771 words - 8 pages Quantum Computers & Quantum Cryptography Innovations in IT Mayi UmBayemake Health Informatics 500 May 17, 2015 Abstract This research pertains to Quantum Computers and Cryptography. These topics have emerged greatly in the past few years, are proven to be very important and useful to businesses. The use of quantum computers and cryptography will be able to offer faster processing of information and security. Quantum computers are

Crypography

605 words - 3 pages Cryptography Cryptography is an algorithm used for secure communication in the presence of third parties through encryption and decryption. It is a common method which enables users to store private or sensitive information transmits across an insecure network, like internet. In this case, it is suggested to use for protecting and guarding the UPS official website information transaction of the between UPS and its customers. In

Steganography

3265 words - 14 pages way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that

Mod 7 Essay Questions

1476 words - 6 pages are unknown and unpredictable by adversaries. The importance of random key generation is it will ensure the key could not be guess or just figured out. 4. Answer. There are two basic types of cryptographic keys: secret key, and public key. The combined use of secret and public key cryptography efficiently underwrites all the authentication, integrity, and secrecy services necessary for most users. The difference between the two is that in

Security Protocols

1624 words - 7 pages  model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography by utilizing asymmetric key cryptography during certain phases of authentication. Kerberos uses port 88 by default. MIT developed

Is4550 Lab 9

632 words - 3 pages . Threat Assessment and Management Policy 8. Which policy definitions reference a Data Classification Standard and use of cryptography for confidentiality purposes? a. Asset Management Policy 9. Which policy definition from the sample IT security policy framework definition mitigate risk in thee User Domain? a. Security Awareness Training Policy 10. Which Policy definition from the sample IT security policy framework definition mitigates risk in

Telecommunications Reform

3164 words - 13 pages Union needed an export license. This regulation was in place in order to prevent reverse engineering of American products. This applies to the American communications industry because tight controls are kept over cryptography products in order to prevent them from being sold to nations who In turn might use our strong encryption protocols against the United States. However, regulation has recently fallen out of favor with much of the developed

Motion Vector

2583 words - 11 pages message and the cover data are only the means of sending it. Secret information as well as cover data can be any multimedia data like text, image, audio, video etc The objective of this work is to develop a Compressed Video Steganographic Scheme that can provide provable security with high computing speed, that embed secret messages into images without producing noticeable changes. Here we are embedding data in video frames. Cryptography

Quantum Quandaries

1626 words - 7 pages . Alain Aspect, a French physicist, later violated the proof in the strongest test done thus far. This confirmed that nonlocal effects do exist. This led Charles Bennett and Gilles Brassard to come up with an idea for quantum cryptography in 1984. It would use a photon’s state changes to make an encrypted key. Six years later, Bennett reported the first test model for key distribution using quantum mechanics. Bennett later proposed that the

Related Papers

Cryptography Essay

2021 words - 9 pages Cryptography is such a broad part of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even know it. Ever write a message in numbers instead of letters? Each letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of

Quantum Cryptography Essay

1002 words - 5 pages Quantum Cryptography Keeping secrets and passing information that is undetected has long been the goal of cryptographers. Codes have been written and then broken keeping cryptographers in constant search for the unbreakable code. Until recently, that goal seemed unreachable; however, a solution to the once impossible question seems to have surfaced. Quantum cryptography delves down into the world of very small particles, where there are

Quantum Cryptography Essay

5279 words - 22 pages Quantum Computing and Quantum Cryptography What do they mean for traditional cryptography? Tim Moses Director, Advanced Security Technology Robert Zuccherato Chief Cryptographer January 13, 2005 Version 1.1 © Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust

Cryptography & Online Bankcard Transactions Essay

1796 words - 8 pages CRYPTOGRAPHY & ONLINE BANKCARD TRANSACTIONS Keller Graduate School of Management SE577ON_A – Cryptography and Security Mechanisms NOV10 Alicia Franklin Cryptography for an Extranet Table of Contents I. Online Banking Overview ………………………………………………3 II. Security Threats to Businesses…………………………………………..3 III. Cross Site Attacks ………...…………………………………………….4 IV. Mitigating Cross Site Attacks ………………………………………….5 V. Phishing