Advantages and disadvantages of the commercial use of strong cryptographic products - Essay Example

Comments (0) Cite this document
However, the use of very strong cryptographic material normally has a negative impact on national security and law enforcement. In this respect, government will tend to control…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Advantages and disadvantages of the commercial use of strong cryptographic products
Read TextPreview

Extract of sample "Advantages and disadvantages of the commercial use of strong cryptographic products"

Advantages and Disadvantages of the Commercial Use of Strong Cryptographic Products By Advantages and Disadvantages of the Commercial Use of Strong Cryptographic Products
Cryptographic has a very important role in the protection of security of information in the society. However, the use of very strong cryptographic material normally has a negative impact on national security and law enforcement. In this respect, government will tend to control the use, research and export of cryptography. This paper will look at the main advantages and disadvantages of the commercial use of cryptographic products (Bao and Deng 2005).
One of the advantages of the commercial use of public-key cryptographic products is the convenience it comes with and the increased security. Private keys are not supposed to be revealed or transmitted to any other individual. On the other hand, secret-key systems have to be transmitted through a communication channel or manually since the same key used for decryption is also used for encryption. In this case, the might be serious threat of an enemy discovering the secret key when it is being transmitted (Guo and Jin 2011).
In addition public-key systems can provide signatures digitally thus preventing repudiation. During authentication through secret-key systems, there is the need of sharing secrets and in other cases it requires the involvement of a third party. This third party can go against the other members and repudiate a message that was previously authenticated and claim the shared secret was compromised. For example, a company may involve a central database that keeps copies in its secret-key system authentication. If this central database is attacked, a widespread forgery on the product of this company would occur. Public-key authentication can prevent this forgery and secure the products of the company.
Cryptography has the disadvantage of speed during encryption. Some encryptions methods are faster than others but they take time to encrypt. In order to maximally reduce the time used during encryption, it is advisable to combine several methods to obtain security advantages and speed. This is done by using public-key systems together with secret-key systems. Public key-systems have the advantage of security while secret key systems have the advantage of speed. This protocol is normally referred to as digital envelope (Mollin 2001).
The creation of the code used in the encryption and decryption process takes time. For one to figure out the best code to use they have to be an expert in that field and at the same time is patient. This makes the process of make the process of cryptography a hectic and tiring one. In the past sending a code from one person to another took a lot of time because of the slow nature of this process.
Another very major disadvantage of encryption technology is the lack of well-established international standards that allows operation of commercial cryptography between different countries across the globe. This has led to difficulties in communication between countries since there is no common standard that allows proper encryption. The standards that have been established, like the DEA-1 [ISO 1987] [ISO 1988a] [ISO 1988b] [ISO 1991a] [ISO 1991b] faced very strong opposition by various agencies of security (Moldovyan 2007).
In summary, the use of commercial cryptography has its own advantages but also faces challenges. Proper use of this technology has saved lives in different commercial products and has led to better security levels
BAO, F. and DENG, R. (2005). Cryptographic solutions for user privacy protection in transactions of digital products. Computer Communications.
Guo, R. and Jin, C. (2011). Two Cryptographic Properties of Strong Security Tweakable Enciphering Scheme. Journal of Electronics & Information Technology, 33(7), pp.1761-1764.
Moldovyan, N. and Moldovyan, A. (2007). Innovative cryptography. Boston: Charles River Media.
Mollin, R. (2001). An introduction to cryptography. Boca Raton: Chapman & Hall/CRC. Read More
Cite this document
  • APA
  • MLA
(“Advantages and disadvantages of the commercial use of strong Essay”, n.d.)
Advantages and disadvantages of the commercial use of strong Essay. Retrieved from
(Advantages and Disadvantages of the Commercial Use of Strong Essay)
Advantages and Disadvantages of the Commercial Use of Strong Essay.
“Advantages and Disadvantages of the Commercial Use of Strong Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Advantages and disadvantages of the commercial use of strong cryptographic products

Advantages and disadvantages of outsourcing

...?Advantages and Disadvantages of Outsourcing Table of Contents Introduction 3 2.Growing Importance of Outsourcing 4 3.Influence of Outsourcing 6 4.Benefits of Outsourcing 9 5.Risk and Disadvantages of Outsourcing 11 6.Conclusion 13 Reference 14 1. Introduction Outsourcing has become a major business in today’s world. Most of the big companies outsource their work which is not their core operation. To understand outsourcing one has to know what does outsourcing means. Outsourcing can be defined as contracting out a work which is not the core function of the business. Various functions of the business can be outsourced. The function which are most popular in outsourcing are IT functions,...
9 Pages(2250 words)Essay

Advantages and disadvantages of measures use to protect operating system differential in efficiency of measures used to protect the operating system. This paper discusses different measures used to protect the operating system and the advantages and disadvantages of each. It basically concentrates on three measures. Furthermore, it discusses ease of implementation and associated security management issues that need to be addressed. It also ranks the measures used to protect the operating system from the most effective to the least effective. Measures used to protect the operating system There are several measures that are used to protect the operating system. These are meant to deny...
7 Pages(1750 words)Research Paper

Assistive Technology: Advantages and Disadvantages

...category can be that blindness or visual imparity proves to inhibit the learning process more than any other disabilities, such as immobility, speaking or hearing disability. Mulligan (2003) provided various generic benefits of the usage of assistive technology by children; this broad study led to the desire of studying the probable changes in the pace of learning and motivation to learn. Berg (n.d.) stated that attitude of a student is the most powerful tool since a good motivational attitude can overcome any kind of obstacle in the learning process. Alongside the advantages of using assistive technologies, it has been found that there also exist some disadvantages and issues with the...
3 Pages(750 words)Essay

Recommendation: its advantages and disadvantages

... the same depreciation method for all assets. Estimation of a provision for depreciation is advantageous since it will help the company minimize it losses. Disadvantages The main disadvantage of the recommendations is time consumption. Calculation of depreciation can be time consuming and tedious especially when using the residual method. The methods can also be costly in terms of technology required, qualified personnel and documentation of the procedures. Thus, the systematic calculation of depreciation will require patience to acquire correct and adequate results. The company must also ensure that it employs qualified personnel to carry out the calculation. This can be costly to the company but it is worthwhile since mistakes... for the...
4 Pages(1000 words)Essay

Army Strong Commercial

...Media questions: Army Strong Commercial 4 1. The core sign that is evident and comprises the entire picture regards the home setting of the young man where he lives together with his parents (Ott & Mack 107). Additional sign is their economic activity, which guarantees their survival where its depiction is via showing the expansive crops’ region besides their farming tractor. These setting signs and diverse sections backgrounds of the casting showing home, normally they do form clustering associations of the video. Regardless of the characters’ talk that entails the goodness of a young person joining the army, here in the media it is a dissociative clustering sign and contrary to its setting (Ott &...
1 Pages(250 words)Assignment

Advantages & Disadvantages of JavaScript

... Advantages & Disadvantages of JavaScript Introduction: JavaScript is a dynamic form of computer language which is used in the purpose of programming. JavaScript has emerged as a leading language that has been used frequently because of its feasibility to target audience. JavaScript had reached a new level of popularity after its adoption from Microsoft as a diverse language for scripting on client side. Due to increment in programming presently, deeper effects of JavaScript has been highlighted regarding its advantages and disadvantages (Quigley, 2004, p. 1). Advantages & Disadvantages of...
2 Pages(500 words)Essay

HSM Performance Optimization

...of the security required by the customer. In addition, a HSM requires support and maintenance adding to the cost incurred by customers that have purchased a HSM.[19] A network appliance version of the SafeNet Luna SA 1700 that can do key exporting costs ~US$25K [20]. 2.9.3 SafeNet Luna SafeNet, Inc.’s Luna SA 1700 HSM was designed with the security of its cryptographic elements in mind. This HSM is a popular choice for enterprises requiring a security mechanism for cryptographic keys that is both strong and trusted. The SafeNet Luna SA 1700 product was designed to address market needs where security is very important. SafeNet Luna can be easily...
30 Pages(7500 words)Essay

Advantages & Disadvantages of Monsters

... humans to suffer. Their disadvantages in people’s lives are reputations preceding them. For example, the article asserts that these monsters cause insanity among other forms of misery. An evaluation of the abovementioned opinions that are considered as representative of several other positions, one might observe that most individuals do not still understand this kind of monster. Actually, several atheists might not perceive the actuality that spiritual monsters, also known as demons, are real. Thus, the perfect evaluation for the disadvantages and advantages of this kind of monsters can merely be advanced through the religious prism. Christianity indicates that there is no good thing that demons are able to bring into the life... down on...
4 Pages(1000 words)Essay

Psychoanalytic therapy advantages and disadvantages

...levels (Wild, Ohmura, & Makowski, 2007). Some scientists seem to go for the idea that the continued use of these aerosols would be a welcome aspect in making better trends towards the realization of better-working motives. The starving of global warming effects would only be possible if the society were to continue producing more sulfates that would in turn lead to diming effects (Wild, Ohmura, & Makowski, 2007). However, concerns arise after other research results established the increased danger of having an increase of sulfates in the atmosphere. An increase in environmental issues such as the production of acidic rain that would ruin more plants that anticipated would be a common occurrence (Kerr,...
1 Pages(250 words)Coursework

Globalization - Advantages and Disadvantages

...with the real-life turn of states, the reduced role of nation states to optimize social welfare was comprehensible. Later, Ricardian principle of comparative advantage also favored the concept of laissez faire through introducing the theory of comparative advantage. According to the principle, nations must be specialized in the production of a few goods according to the availability of resources in the region. The specialization drive must be guided by the relative cost of factors of production in an area along with other advantages of producing the same. Importance of the specialization measure is not only to make the optimal use of...
9 Pages(2250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Advantages and disadvantages of the commercial use of strong cryptographic products for FREE!

Contact Us