350CT System Security

Question:

Please note that the coursework will require you to use experimental evidence to support your posters.

You have two options: you can either target servers located within the hacking center (EC1-14), or work with a friend to target your host computers.

Another option is to use a virtual network such as.

Kali can be used with your own host computer. Or you can experiment on your own local network.

Answer:

Introduction

Cryptography can be described as the process of making ordinary text unintelligible (Suveetha, Manju 2016).

This method is mostly used for storing and transmitting data in the given format.

Cryptography isn’t just about data security, but also user authentication.

It provides secure and improved communication in spite of adversaries (third-party communication).

The proper algorithm and key transforming of the input into an encrypted output is used to encrypt the data (Hynes Cheng, Song 2018).

If the attackers can’t easily verify any property in plain text, then algorithm is considered secured in nature.

An attacker should not have access to a large amount of plaintext keys that are used.

Different approaches to cryptography will be discussed in the following pages.

The last section of this report focuses on recent developments in Cryptography.

Encryption systems use a common key that both the receiver (Sasi) and the transmitter (Sivanandam, 2015).

It is used to encrypt and decrypt the messages.

It is different from some public key cryptography which uses two keys, one being public and the other private.

Symmetric key is faster and simpler, but it has many drawbacks.

It is a way for two parties to easily exchange their keys in a safer and more efficient manner.

Public encryption is a way to avoid this problem as it allows for the distribution of keys to be verified in a much more secure way.

In general, private keys can’t be transmitted or given in any way that is highly secure.

Both the sender as well as the receiver share a single key in this way.

The sender uses this key to provide plaintext and encrypted text to the recipient (Mei Chen, Huan 2016, Huan).

On the other, the receiver seeks to recover plain text and decryption key.

Public-Key Cryptography

Public key encryption, a well-known encryption method that makes use of a paired of private and public key algorithm is required for secure communication (Tao (2016).

For encryption, the sender of the message uses the recipient as a key to decrypt the message.

The recipient private must be used to decrypt the sender’s message.

There are two types of PKC algorithms: RSA (Rivest-Shamir-and Adelman) and DSA.

PKC algorithm mainly focuses upon enhancing secure communication, which is dependent on different sectors and industries such as military.

It has been a revolutionary idea for the last 300-400 year (Wu et.al.

If it is paired up with a private key, then the public key of model is free to be distributed.

The public key in model is primarily used for encryption and decryption.

Digital Signature

Digital signature is a public key primitive of the given message-based authentication (Adhie, et al.

It is often a handwritten signature or a text message.

It is necessary to provide binding signature for the message.

A digital signature is a useful technique that can be used to legally bind an entity or person to the digital data.

The third party can easily access the given binding.

Digital signatures are digitally signed using a secret key and data to calculate cryptographic value.

To understand the message sent, the recipient must be able to provide proof of identity.

This fact must be considered (Hynes Cheng, Song 2018).

This is a significant factor because it brings up high-value data exchanged.

Digital Certificates

This digital certificate-based authentication is used to authenticate web-based credentials.

Consumers and businesses can secure public key infrastructure applications with digital certificates (Suveetha, Manju 2016).

PKI provides technology needed to protect both internet-based and online-based sources.

Online platforms are gaining popularity at an alarming rate.

Access to online platforms is now much easier and more affordable.

Authentication is all about understanding the identity and verifying it.

The entire procedure is about understanding the request and verifying credentials.

The credential will be compared with the user’s file in the database (Cao, et al.

The authentication process takes place at the very beginning of any application before any code can execute.

Each system has a different set of requirements for authentication.

Credential is the password given to the user. It is usually secret in nature (Tao, Dubrova 2016,).

There are two main phases to authentication.

The identification phase aims to identify the user and provide access to the system.

Cryptography: Development

Cryptography can play an important role in communication, including e-mail and cell phone communications (Sasi und Sivanandam 2015.

This technology can be considered an essential part of the information system in future years.

Cryptography technology provides a wide variety of technology that can provide accuracy and confidentiality.

This technology can protect you from fraud and validate your financial transactions.

Cryptography allows you to access any web page and stop industrial competition.

This technology will become increasingly important as communication moves to system-based networks in the next years.

Conclusion

The report’s above pages are mainly about cryptography technology.

On the following pages, you will find detailed information on various cryptographic technologies such as secret key cryptography (public key cryptography), digital signature, digital certificates, and authentication.

Following that, various developments in cryptography methods have been briefly discussed.

Refer to

Adhie R.P. Hutama Y. Ahmar A.S. and Setiawan M.I. 2018, January.

Implementation Cryptography Data Encryption (DES), and Triple Data Encryption (DES), Method in Communication System Based Near Field Communication.

In Journal of Physics Conference Series (Vol.

IOP Publishing.

Cao, X. Zhang J. Fu L. Wu W. Wang, X.

In large-scale mobile networks, the optimal secrecy capacity and delay tradeoff.

IEEE/ACM Transactions on Networking 24(2), pp.1139-1152

Hynes (N.), Cheng (R.) and Song (D.), 2018.

Mei W. Chen Z. and Huang C. (2016). May.

Transmit design using robust artificial noise to aid multi-user MISO systems that integrate services was achieved by robust transmit design.

ICASSP (pp.

Sivanandam (N.), 2015.

A survey on cryptography with optimization algorithms in WSNs.

Indian Journal of Science and Technology (8(3), pp.216-221.

Suveetha K. & Manju T. (2016).

Use homomorphic encryption to ensure confidentiality of cloud data.

Indian Journal of Science and Technology (9(8).

Tao, S., and Dubrova E. (2016)

Wu, Y. Schober R. Schober R., Ng D.W.K. Xiao C., and Caire G.

Secure massive MIMO transmissions using an active eavesdropper.

IEEE Transactions on Information Theory (62(7)), pp. 3880-3900.

Leave a Reply

Your email address will not be published.