StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cryptographic Failures and Challenges - Assignment Example

Cite this document
Summary
Cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it. However, just like any other inventions, there are instances where the system fails, either due to hacking…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful

Extract of sample "Cryptographic Failures and Challenges"

Cryptographic Failures and Challenges Affiliation Cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it. However, just like any other inventions, there are instances where the system fails, either due to hacking or general failure. In this case, private information is compromised and it can lead to disclosure of crucial data to the public.A recent such occurrence was witnessed in Taiwan, where scientist unearthed a flaw with the country’s secure digital ID system.

The error enabled attackers to masquerade as some citizens who depend on it to register their cars, pay taxes, as well as file immigration documents. The crippling weaknesses discovered in the Taiwanese Citizen Digital Certificate Program spread uncertainty that certifications intended to guarantee cryptographic security used by governments and enemies cannot circumvent other delicate organizations. The scientists revealed what they termed a ‘fatal flaw’ in the hardware random number generator which in normally used to make sure that the numbers that make the raw materials of crypto keys are not based on noticeable patterns.

Randomness is considered a fundamental element in ensuring enemies does not hack the cryptographic keys reinforcement in the smartcards provided to the Taiwanese citizens.For the over 2 million 1024-bit RSA keys examined, about 184 keys were developed so defectively, they could be hacked in a few hours by use of known mathematical techniques and standard computers. However, if the keys had been developed right, hacking them so fast would have needed a huge supercomputer. It, therefore, reveals the feebleness of cryptographic protections that millions of individuals increasingly depend on to protect their business-sensitive secrets and most personal secrets.

The case is an example of one of the many cases revealing weaknesses in encryptions. In conclusion, cryptography is very vital as it invention was meant on secrecy and, therefore, there should be some ways of ensuring that they uphold their mandate. In addition, since most of the breakings done are usually linked with poor generation of raw materials or codes, persons involved should be kept on their toes so that they ensure to work correctly as needed. ReferenceGoodin D., 2013, retrieved from http://arstechnica.

com/security/2013/09/16/fatal-crypto-flaw-in- some-government-certified-smartcards-makes-forgery-a-snap/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cryptographic Failures and Challenges Assignment”, n.d.)
Cryptographic Failures and Challenges Assignment. Retrieved from https://studentshare.org/information-technology/1692140-cryptographic-failures-and-challenges
(Cryptographic Failures and Challenges Assignment)
Cryptographic Failures and Challenges Assignment. https://studentshare.org/information-technology/1692140-cryptographic-failures-and-challenges.
“Cryptographic Failures and Challenges Assignment”, n.d. https://studentshare.org/information-technology/1692140-cryptographic-failures-and-challenges.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cryptographic Failures and Challenges

Security in Electronic Voting Systems

The author learns electronic voting security requirements, cryptographic chimes of an electronic voting system, e-voting system using a blind signature, pseudo voter identity.... The paper "Security in Electronic Voting Systems" deals with voting systems in universities for teaching and voting....
7 Pages (1750 words) Case Study

The Marketing Situation of X Infotech

The paper describes the single most strategy which can ensure a business to grow in uncertain times.... For smaller businesses, which do not have a brand equity advantage, top quality service is the only USP which can give them an edge over the competition.... hellip; Catering to clients across Europe, X Infotech is a relatively smaller organization, which often relies on third-party technicians for client-side maintenance service....
12 Pages (3000 words) Research Paper

The Uses of Basic Cryptography in My Organization

At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage in any form of online commerce or which have an online presence.... My organisation is not an exception to this rule and conversations with the IT department head affirmed the use of cryptographic technologies, even as it established that they were hardly a foolproof defence against unauthorised access....
4 Pages (1000 words) Essay

Micropayments: challengesand trends

The paper “Micropayments: challenges and Trends” discusses the advantages and disadvantages of micropayment based system.... Although the micropayment based system has several advantages there are also certain disadvantages that are associated like technical, social and economic issues....
13 Pages (3250 words) Essay

Security on Computer Systems and Information Systems

Organizations face numerous malicious attacks and threats every other time.... What is essential to such an organization is to have is to have a plan on how to identify the risks and to… The nature of the attack determines the way the strategies being put in place.... They include the policies set at the administrative level. The tools authenticate by the organization also vary....
5 Pages (1250 words) Coursework

Network IT Operations Report and Configuration

hellip; Let us first begin by identifying issues and challenges currently being experienced by the Dead Duck Publishing Company.... The current design, therefore, deserves a thorough problem analysis and redesigning taking all the critical challenges into consideration....
14 Pages (3500 words) Coursework

Net Work Security: Kerberos and Key Management

… 5 April 2008Kerberos comes from a Greek word which means a three headed dog who guards the doors of the underworld.... As used in this project, Kerberos is an authentication protocol which was developed by MIT.... Kerberos is usually embedded in windows 5 April 2008Kerberos comes from a Greek word which means a three headed dog who guards the doors of the underworld....
18 Pages (4500 words) Essay

Business Continuity Plan for Motosport Limited

… Business continuity planBusiness continuity plan abbreviated as BCP is a document which details the schedule methodology, procedures, practices and instructions of actions to be done during disaster recovery (www.... hebci.... rg).... The document documents Business continuity planBusiness continuity plan abbreviated as BCP is a document which details the schedule methodology, procedures, practices and instructions of actions to be done during disaster recovery (www....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us