StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology and Public Key Cryptography - Essay Example

Cite this document
Summary
The paper "Information Technology and Public Key Cryptography" states that to facilitate distinctive features of the web of trust systems, a modifiable message format was established by the PGP for encoding messages that are encrypted along with database entries, certificates…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Information Technology and Public Key Cryptography
Read Text Preview

Extract of sample "Information Technology and Public Key Cryptography"

?Introduction Standards are developed for simplifying compatibility issues, as different PKI users configure and operate on different PKI infrastructures. Moreover, security will not be guaranteed, as users may incorporate vulnerable PKI resulting in security breaches and other hacking activities. For making a standardized worldwide approach, the Public Key Cryptography Standards (PKCS) are specified and developed by RSA laboratories with the contribution of secure system developers located globally. The document of PKCS is adapted and implemented globally, as the assistance from the PKCS series are now a part of various formal and de facto standards such as ANSI XP documentation, PKIX, SET, MIME and SSL (Public-Key Cryptography Standards. 2007). Similarly, the RSA cryptography standard is associated with a Public Key Cryptography Standards (PKCS) that highlights data encryption by utilizing RSA algorithm. The primary objective or reason for this standard is the construction of digital envelops and digital signatures. Moreover, the standard also defines syntax for private and publics keys of RSA. The syntax is utilized for digital certificates and the syntax for private keys is utilized for private key encryption (RSA Cryptography Standard. 2007). Public key cryptography relies on algorithms associated with asymmetric cryptography along with two incorporated keys i.e. a public key and a private key. Likewise, these two keys are separate and are utilized for decrypting and encrypting data or messages. If any user composes an electronic mail, he or she possesses a private for the email themselves. However, if the sender tries to open the email, he or she must possess a public key for accessing it. RSA public key encryption algorithm converts the private key to public key. Moreover, a signature algorithm that ensures authenticity of the sender can be incorporated with the private key without the intervention of the private key, as fundamentally it will not be possible to search two messages possessing similar signatures. The PKCS incorporates different versions such as v 2.1 standards that are associated with deploying public key cryptographic encryption along with digital signatures with appendix. Moreover, it also reflects ANS.1 syntax that illustrates keys for identifying different schemes. RSA is basically a public key algorithm that is invented by Rivest, Shamir and Adleman (Biskup) and is focused on an exponentiation module that comprises of two great prime numbers. Likewise, the security incorporated in RSA algorithm is focused on the solidity of multiplying the procedure associated with great prime numbers. Moreover, in the next version i.e. version 2.1, RSA multiprime function was incorporated. The table 1.1 shows the encryption and decryption of messages by private and public keys. Activity Keys Sending an Encrypted Message or data Utilizing the receivers public key Sending an encrypted signature Utilizing the sender’s private key Decrypting an encrypted message Utilizing the receivers private key Decrypting an encrypted signature Utilizing the sender’s public key Figure 1.1 Comparison X.509 and PGP X.509 is considered to be an ITU-T standard that is known for Public Key Infrastructure (PKI). Likewise, it specifies standardized formats associated with public key certificates and a validation algorithm for certification path. Moreover, this standard was preliminary developed in 1988 and was integrated with X.500 standard (X.509. 2007). After the integration, it was considered to be a solid hierarchical mechanism of Certificate Authorities (CA) that is responsible for issuing certificates. It is a fact that X.500 system was not completely deployed, as the IETF working group associated with public key infrastructure has acquired the standard for Internet that is considered to be a flexible environment (X.509. 2007). Besides, in the year 1998, PGP was considered to be a relatively low cost solution possessing features such as robust file, disk and email encryption suite that is based on Network Associates that is a PGP certificate. Moreover, PGP is now becoming widely acceptable PKI (McClure 1998). The PGP PKI is fast but there is one drawback, as it does not have built in support for X.509. Moreover, it is also limited in terms of foundation libraries from its PGP sdk components (McClure 1998). However, apart from the factors that need an upgrade, PGP PKI is an easy and quick solution for deploying encryption on a global scale for data transmission and electronic mail. If any organization decides to deploy PGP, the infrastructure will be able to incorporate any X.509 infrastructure (McClure 1998). Some of the summarized features and drawbacks for PGP PKI are illustrated below (McClure 1998): “Network Associates' new security suite is a low-cost, easy-to-implement alternative to the high-maintenance world of public key infrastructures. Pros: Low cost; minimum setup headaches; signature expiration; key splitting; Lightweight Directory Access Protocol certificate server; photo identification; Transport Layer Security support. Cons: Certificate server not X.509-based; no Netscape plug-in support. Network Associates Inc., Santa Clara, Calif.; (800) 764-3337; fax: (408) 970-9727; www.nai.com. Price: $84 for single seat; $26 per seat for 1,000 seats. Platform: Windows N T 4.0” If we compare the certificate structure of X.509 PKI and PGP PKI, the X.509 structure is small as compare to PGP PKI. The field for a simplified X.509 PKI incorporates subject, issuer, Validity time, key, Subject alternate name and signature. Similarly, the simplified PGP PKI incorporates key, subject name, issuer, validity time, signature and again another segment of all the similar fields and two spaces for sub keys. In order to facilitate distinctive features of web of trust systems, a modifiable message format was established by the PGP for encoding messages that are encrypted along with database entries, certificates and revocation messages (Vacca). Moreover, the design that is defined in RFC 2440 facilitates a PGP certificate to encompass signatures and names, as they are conflicting in the case of X.509. Moreover, the specification associated with XKMS defines that a meta-PKI can be utilized for registering locating and validating keys that can be by an X.509 certificate authority or a PGP referrer, SPKI signer or the infrastructure of SPKI (Vacca). Likewise, the specifications incorporate two protocol specifications i.e. X-KISS (XML Key Information Service Specification) and X-KRSS (XML Key Registration Service Specification) (Vacca). There are some studies that reflect amendments or modifications in the design of X.509 architecture, as the new design will obtain the certificate in an easy way along with saving costs associated with applications supporting certificate functions. Likewise, the primary objective is to grant access to Internet complaint services that will utilize signatures based on certificate and encryption features without human intervention. Bibliography BISKUP, J., Security in Computing Systems: Challenges, Approaches and Solutions Springer. MCCLURE, S., 1998. PGP brings security to masses. InfoWorld, 20(40), pp. 44C. Public-Key Cryptography Standards. 2007. Network Dictionary, , pp. 392-392. RSA Cryptography Standard. 2007. Network Dictionary, , pp. 421-421. VACCA, J.R., Computer and information security handbook Amsterdam ; Morgan Kaufmann, c2009. X.509. 2007. Network Dictionary, , pp. 535-535. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Information Technology Essay Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/information-technology/1454774-dqweek
(Information Technology Essay Example | Topics and Well Written Essays - 1000 Words - 1)
Information Technology Essay Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/information-technology/1454774-dqweek.
“Information Technology Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/information-technology/1454774-dqweek.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology and Public Key Cryptography

Cryptography & Coding

The technology of cryptography is very old but its utilization in the information technology sector was seen after the emergence of web based crimes.... cryptography Author Author Affiliation Date Table of Contents Abstract As the technology advances the need for effective tools and applications also grows.... One fundamental way for safe communications is cryptography.... cryptography is presently the main information and data security technology....
14 Pages (3500 words) Essay

Attacking Cryptography

This type of attack is most generic for asymmetric cryptography, as Charlie can gain a public key via cryptanalyst.... The paper "Attacking cryptography" highlights that generally, for attacking Alice's workstation that is maintaining encrypted passwords via an open-source tool, Charlie can deploy and execute various attack methods as discussed in the body of the paper.... cryptography goes with the approach of upgrading the new state-of-the-art encryption algorithms one after another and from safe to the safest so that they cannot be cracked....
5 Pages (1250 words) Essay

Cryptography and Security Services

The paper "cryptography and Security Services" is centered on cryptography as a powerful system that is facilitated by the National Security Agency in the US.... In the past, cryptography was primarily used for military and government intelligence, which is still very important to date.... However, advancement in electronic communication systems especially the internet has fueled the use of cryptography in sending private messages and information such as medical records, banking data, and credit card numbers among others via electronic channels....
12 Pages (3000 words) Case Study

Cryptography Secure Socket Layer

This type of attack is most generic for asymmetric cryptography, as the hacker can gain public key via cryptanalyst.... Moreover, an attack can be executed the attack on public key encryption, as it initiate with a cipher text and seeks for similar matched plaintext data available publically.... Full Paper Title Name University Table of Contents cryptography …………………………………… Page 3- 6 Conclusion …………………………………… Page 6-7 References …………………………………… Page 7 Glossary of Terms …………………………………… Page 8 cryptography Secure Socket Layer v3 The reason for using an open source operating systems is to customize and select appropriate technology that was set to default....
4 Pages (1000 words) Research Paper

Information Systems and Security

The present age is the age of information technology; especially the ecommerce and communication technology has transformed the structure of business.... At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.... This paper presents detailed overview of the cryptography and modern methods of cryptography implementation for the better management of information system and its security....
8 Pages (2000 words) Essay

Advantages and disadvantages of the commercial use of strong cryptographic products

public key-systems have the advantage of security while secret key systems have the advantage of speed.... Journal of Electronics & information technology, 33(7), pp.... In this respect, government will tend to control the use, research and export of cryptography.... Disadvantages cryptography has the disadvantage of speed during encryption.... This makes the process of make the process of cryptography a hectic and tiring one....
2 Pages (500 words) Essay

Cryptography as One Fundamental Way of Saving Communications: Information and Data Security Technology

These encryption keys are known or labeled as a private and a public key.... The majority widespread shape of asymmetrical encryption is in the implementation of transmitting data messages where the correspondent encodes as well as the receiving person translates the data and information message through utilizing a random key produced through the public key of the dispatcher.... The technology of cryptography is very old but its utilization in the information technology sector was stated after the emergence of web-based crimes....
18 Pages (4500 words) Research Paper

Security Foundation

This report will conduct a critical analysis of cryptography and Application and Systems Development Security to conduct related job titles (Edward, 2005).... cryptography also entails developing computational models that will help solve problems in science, engineering, business, or other industries.... ryptography jobs entail analyze and decipher encrypted data to assist the government (National Institute of Standards and technology, 2011), businesses, or law enforcement officers in solving threats, crime, or security concerns (Satoh and Araki, 2006)....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us