StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advantages and disadvantages of the commercial use of strong cryptographic products - Essay Example

Cite this document
Summary
However, the use of very strong cryptographic material normally has a negative impact on national security and law enforcement. In this respect, government will tend to control…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Advantages and disadvantages of the commercial use of strong cryptographic products
Read Text Preview

Extract of sample "Advantages and disadvantages of the commercial use of strong cryptographic products"

Advantages and Disadvantages of the Commercial Use of Strong Cryptographic Products By Advantages and Disadvantages of the Commercial Use of Strong Cryptographic ProductsAbstract Cryptographic has a very important role in the protection of security of information in the society. However, the use of very strong cryptographic material normally has a negative impact on national security and law enforcement. In this respect, government will tend to control the use, research and export of cryptography.

This paper will look at the main advantages and disadvantages of the commercial use of cryptographic products (Bao and Deng 2005). AdvantagesOne of the advantages of the commercial use of public-key cryptographic products is the convenience it comes with and the increased security. Private keys are not supposed to be revealed or transmitted to any other individual. On the other hand, secret-key systems have to be transmitted through a communication channel or manually since the same key used for decryption is also used for encryption.

In this case, the might be serious threat of an enemy discovering the secret key when it is being transmitted (Guo and Jin 2011). In addition public-key systems can provide signatures digitally thus preventing repudiation. During authentication through secret-key systems, there is the need of sharing secrets and in other cases it requires the involvement of a third party. This third party can go against the other members and repudiate a message that was previously authenticated and claim the shared secret was compromised.

For example, a company may involve a central database that keeps copies in its secret-key system authentication. If this central database is attacked, a widespread forgery on the product of this company would occur. Public-key authentication can prevent this forgery and secure the products of the company. Disadvantages Cryptography has the disadvantage of speed during encryption. Some encryptions methods are faster than others but they take time to encrypt. In order to maximally reduce the time used during encryption, it is advisable to combine several methods to obtain security advantages and speed.

This is done by using public-key systems together with secret-key systems. Public key-systems have the advantage of security while secret key systems have the advantage of speed. This protocol is normally referred to as digital envelope (Mollin 2001). The creation of the code used in the encryption and decryption process takes time. For one to figure out the best code to use they have to be an expert in that field and at the same time is patient. This makes the process of make the process of cryptography a hectic and tiring one.

In the past sending a code from one person to another took a lot of time because of the slow nature of this process.Another very major disadvantage of encryption technology is the lack of well-established international standards that allows operation of commercial cryptography between different countries across the globe. This has led to difficulties in communication between countries since there is no common standard that allows proper encryption. The standards that have been established, like the DEA-1 [ISO 1987] [ISO 1988a] [ISO 1988b] [ISO 1991a] [ISO 1991b] faced very strong opposition by various agencies of security (Moldovyan 2007).

In summary, the use of commercial cryptography has its own advantages but also faces challenges. Proper use of this technology has saved lives in different commercial products and has led to better security levelsReferencesBAO, F. and DENG, R. (2005). Cryptographic solutions for user privacy protection in transactions of digital products. Computer Communications.Guo, R. and Jin, C. (2011). Two Cryptographic Properties of Strong Security Tweakable Enciphering Scheme. Journal of Electronics & Information Technology, 33(7), pp.1761-1764.Moldovyan, N.

and Moldovyan, A. (2007). Innovative cryptography. Boston: Charles River Media.Mollin, R. (2001). An introduction to cryptography. Boca Raton: Chapman & Hall/CRC.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advantages and disadvantages of the commercial use of strong Essay”, n.d.)
Advantages and disadvantages of the commercial use of strong Essay. Retrieved from https://studentshare.org/information-technology/1675049-advantages-and-disadvantages-of-the-commercial-use-of-strong-cryptographic-products
(Advantages and Disadvantages of the Commercial Use of Strong Essay)
Advantages and Disadvantages of the Commercial Use of Strong Essay. https://studentshare.org/information-technology/1675049-advantages-and-disadvantages-of-the-commercial-use-of-strong-cryptographic-products.
“Advantages and Disadvantages of the Commercial Use of Strong Essay”, n.d. https://studentshare.org/information-technology/1675049-advantages-and-disadvantages-of-the-commercial-use-of-strong-cryptographic-products.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advantages and disadvantages of the commercial use of strong cryptographic products

The advantages and disadvantages of electronic books

Name Professor Module Date Electronic Book Usage: advantages and disadvantages The issue concerning the usage of electronic books has resulted to frenzy among publishers, librarians and users world over.... This paper gives a comprehensive analysis of the advantages and disadvantages associated with the use of e-books and gives recommendations on how to improve in their usage.... In spite of the numerous disadvantages associated with the use of e- books, different users are gradually accepting their use in the academic and commercial fields (Steve, 32)....
5 Pages (1250 words) Essay

Modern Cryptographc Protocol in Fixed and Mobile Communication

This paper ''Modern Cryptographc Protocol in Fixed and Mobile Communication'' entails efficient validation of cryptographic protocols that are being used both in fixed as well as mobile communications.... It can be apparently observed that network security incorporates wide application of cryptographic protocols as well as algorithms in order to ensure secured and safe communication within different technological aspect.... Formal verification views at providing a rigid as well as a thorough medium for evaluating the effectiveness of cryptographic protocols (Chaabouni, Lipmaa, & Shelat, 2009)....
7 Pages (1750 words) Research Paper

Types of Devices and How They Are Cloned

The research has shown that the development of a clone provides a variety of advantages.... The paper "Types of Devices and How They Are Cloned" discusses that an attacker who has made the clone of a mobile phone or SIM card can cause serious damage to a mobile account, in the form of suffering huge expenditures by having pay-per-call services, making distance calls....
10 Pages (2500 words) Essay

The Uses of Basic Cryptography in My Organization

My organisation is not an exception to this rule and conversations with the IT department head affirmed the use of cryptographic technologies, even as it established that they were hardly a foolproof defence against unauthorised access.... he IT department director confirmed the use of data encryption technologies.... At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage in any form of online commerce or which have an online presence....
4 Pages (1000 words) Essay

Industrial Espionage in America

The information revolution and the advances in technology during the past decades has brought to fore many challenges and issues to both governments and businesses – the age-old crime of espionage or the practice of spying to gather secret information is one the most potential… While high technology offers the ability to collect and use information for competitive edge over others in meeting business and government objectives, it also makes modern information and d nations and businesses vulnerable as information can be stolen from electronic storage media and transmitted in seconds without even physically removing the data....
11 Pages (2750 words) Essay

Advantages and Disadvantages of GMO Cotton

An essay "advantages and disadvantages of GMO Cotton" reports that the growth of cotton is popular in five continents of the world.... The European Union is yet to approve submissions made for the growth and use of modified cotton.... The trouble led to the use of more pesticides on the plant plus the price for the cotton seeds went up by a large number.... There is a significant decline in the use of insecticides because of the reduction in the bollworm pest....
6 Pages (1500 words) Essay

Cryptographic Failures and Challenges

or the over 2 million 1024-bit RSA keys examined, about 184 keys were developed so defectively, they could be hacked in a few hours by use of known mathematical techniques and standard computers.... The error enabled cryptographic Failures and Challenges Affiliation Cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it.... The crippling weaknesses discovered in the Taiwanese Citizen Digital Certificate Program spread uncertainty that certifications intended to guarantee cryptographic security used by governments and enemies cannot circumvent other delicate organizations....
1 Pages (250 words) Assignment

IPSec and Cryptography

The paper "IPSec and Cryptography" offers a clear discussion of the major functions of IPsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process.... t the IP layer, the IPsec offers the necessary security that allows the system to choose the suitable security protocols, establish the algorithms to be employed for the task and reorganize the cryptographic keys needed to offer the application....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us