StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Encryption - Essay Example

Comments (0) Cite this document
Summary
Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Encryption
Read TextPreview

Extract of sample "Encryption"

Download file to see previous pages Chung takes V2 kL mod n1 received from Lilly and operates on it by exponentiation modulo n1 with kC to give V2 kLkC mod n1. He intends to use this as session key ks1C to encrypt his message to a client.
Ks1C =
V2 kLkC mod n1 =
37(127*234) mod 257 =
133 mod 257
Step 4
Lilly takes V1 kC mod n1 received from Chung and operates on it by exponentiation modulo n1 with kL to give V1 kCkL mod n1. She intends to use this as session key ks1L to attempt to decrypt Chung's message to a client.
Ks1L =
V1 kCkL mod n1 =
126(234*127) mod 257 =
252 mod 257
(b) If Chung and Lilly had both picked the value V4 for their parts of the key exchange using the method illustrated in part (a), the result would be a session key of 192. Complete Table A4 to show how a session key ks = 192 might be encrypted with the client's public key, and then decrypted by the client on receipt.
Table A4 Encryption of the session key
Step 1
The value for the session key ks supplied in Question 2 Part (b).
ks =192
Step 2
The value for the modulus n2 supplied in Question 2 Part (b)
n2 =26
Step 3
The value of the session key ks written as text
ks expressed in text = one nine two
Step 4
A suitable value for Tait's public key KT
KT = 15
Step 5
The session key ks encrypted with Tait's public key KT.
{ ks} KT =
C T: {R}ks, {ks}KT =
CNINQNIZSC
Step 6
__
A suitable value for Tait's private key KT
__
KT =7
Step 7
The result of decrypting the encrypted session key
__
using Tait's private key KT
{{ks}KT}KT =
ONENINETWO
Question 3
Complete the following unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the 'Background for Questions...
Today, the encryption process involves altering and rearranging bits of digital data using a systematic procedure that can be converted into a computer program. Encryption is a commonly used method for providing a certain degree of security in technology-based systems. Simple encryption methods include the substitution of letters for numbers, the rotation of letters in the alphabet or the "scrambling" of voice signals by inverting the sideband frequencies. The more complex methods use sophisticated computer algorithms that rearrange the data bits in digital signals. Data is converted into a series of numbers which are then used as input into calculations. The calculated results become the encrypted data (Case Resource). In 1976 the idea of public key encryption was introduced to the field of cryptography. The idea revolved around the premise of making the encryption and decryption keys different so that the sender and recipient need not know the same keys. The sender and the recipient will both have their own private key and a public key would be known by anyone. Each encryption or decryption process would require at least one public key and one private key (Mycrypto.net 2008). Public key encryption techniques or asymmetric key systems avoid the need to distribute keys in secret. Symmetric key systems are those which allow the decryption process to be derived from the encryption key. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Encryption Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Encryption Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1507211-answering-two-questions-on-encryption-some-maths-involved-including-completing-an-essay
(Encryption Essay Example | Topics and Well Written Essays - 1500 Words)
Encryption Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1507211-answering-two-questions-on-encryption-some-maths-involved-including-completing-an-essay.
“Encryption Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1507211-answering-two-questions-on-encryption-some-maths-involved-including-completing-an-essay.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Encryption

Asymmetric or Symmetric Encryption

..., filched, or misrepresented. Unprotected data could be accessed unscrupulously to fetch devastating consequences for any organization. Protection of data is mediated by various algorithms meant to encrypt the information (Symmetric and asymmetric cryptography overview). Asymmetric encryption or public key encryption involves two set of keys one is public key for encryption and another key for decryption, a private key. On the other hand symmetric encryption encompass a secret key that is applicable to encrypt plus to decrypt the information. It is a private single key common to both the receiver and the sender to decipher the...
2 Pages(500 words)Essay

Blowfish Encryption Algorithm

...method that uses a variable length key from 32 to 448 bits long. It uses the block cipher method, which breaks the text into 64-bit blocks before encrypting them. Written by Bruce Schneier, as a free replacement for DES or IDEA, it is considered very fast and secure” and as per network dictionary, it is defined as “Blow?sh is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable use”. Blowfish is an encryption algorithm that was invented by Bruce Schneier in 1993 (Pachghare, n.d)....
8 Pages(2000 words)Essay

Image Encryption Reserach Paper

...encryption as well as the Chaos based. The objectives and future achievements that are in place are also discussed. Introduction In our current world, very important information is always transmitted to various places via the internet. For some reason, this information may sometimes be accessed by people who should not access the information at all e.g. internet hackers. It is for this reason that most organizations prefer to use image hiding to protect the crucial information that they move in the network. Image encryption is the cryptographic process that involves the transformation of plaintext information, using the cipher algorithm so that it is made unreadable to anyone apart from the people who...
5 Pages(1250 words)Research Paper

Encryption Exploitation Technologies

... which define how data should be secured for confidentiality, authenticity, privacy, integrity, access control and nonrepudiation (Knott & Steube, 2011). The process of encryption employs different methods with a view of ensuring that information in its original and natural format is altered or converted into formats which cannot be read by systems attackers. Hence encryption is basically viewed at ascertaining that it is only the intended receivers who are able to read the message. This research paper gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies. Symmetric Encryption Symmetric encryption is one of the major methods that are used...
6 Pages(1500 words)Research Paper

The Advanced Encryption Standard

..., for the United States federal government (Pachori et al, 967). AES is actually a variant of Rijndael cipher where there is a fixed block range of 128 bits and the keys for the AES vary from 128, 192 to 256 bits. AES is usually known by the key size that is used in its package, i.e., AES-128 or AES-256. Contrary to the AES, Rijndael cipher is any block or any key size that is in multiples of 32 bits (Paar & Pelzl, 2010). AES encryption requires the data being flattened into a 4 x 4 column-major order matrix and it has a special finite field in which the calculation is done. The design principle used for the AES is the substitution-permutation network which is several times faster than the Feistal network used by the DES.The transformation...
3 Pages(750 words)Admission/Application Essay

Data Encryption and Authentication Methods

...established online through digital signatures or certificates. Encryption can be of different types based on functionality or the where data is encrypted. Based on the location of encryption of data, it is divided into the following types: Manual Under this encryption, the user has to manually select the files and folders to be encrypted and run special command/ menu item to encrypt and decrypt the selected objects through certain software. Thus, the user must always remember to encrypt the relevant data before logging off. This gives scope for human errors, where the user might forget to encrypt the...
5 Pages(1250 words)Term Paper

Security through Authentication and Encryption

... through authentication and Encryption Security issues are the ones that Government take pride for determining technical standards within the domain of the private sector. Since technology is on its way to implement some technical standards to secure communication mode, first of all it mandates standards to mandate Internet commerce and communication. Among the most significant issue concerning technical standards is the usage of security and authentication. Authentication is not only required in communications between organizations and clients but is also a considerable issue in making electronic payments over the Internet. Depending on the direction and interactivity, authentication requires some previously stored data while...
8 Pages(2000 words)Coursework

Public Key Encryption and Digital Signature

... user has sole responsibility for protecting his or her private key, public-key authentication effectively prevents any sort of repudiation; this property of public-key authentication is often called non-repudiation. (‘Harvard style’, n.d.a) 3. Speed Secret-key encryption methods are significantly faster than any currently available public-key encryption methods. (‘Harvard style’, n.d.a) 4. Vulnerability Unlike secret-key cryptography, public-key cryptography may be vulnerable to impersonation even if user’s private keys are not available. A successful attack on certification authority will allow an adversary to impersonate whomever the adversary chooses by using a public-key certificate from the compromised authority to bind a key...
17 Pages(4250 words)Assignment

Data Encryption

..., user files, concealed files, system files, etc.) on laptops, desktops as well as removable storage. This system offers business a centralized management of operations that is possible through the regular, centralized strategy enforcement by means of single web-based organization console for the entire users. In case of business point of view this system offer simple pass phrase as well as machine revival that is a Local self-revival, one-time-use token in addition to additional recovery alternatives. This system is developed for powerful and high optimization, performance, as well as powerful encryption, offered by means of PGP Hybrid Cryptographic Optimizer (HCO) technology. This system offers User-friendly–Background encryption by means...
2 Pages(500 words)Essay

Mathematical Focus on RSA Public & Private Key encryption

... signatures will be used in conducting transactions, and it is important to know the mathematical process of their formation. The signature is created by a sequence of mathematical methods that transform data to a coded message. The sender creates an encryption of the message, attaches the encrypted message, and embeds it in a file. After embedding the message, the sender sends over the file to the recipient. Once the recipient receives the data, and the message is decrypted, and the process of determining the authenticity and reliability of the message begins (Knudsen,26). To measure the reliability of the message, the digital signature has to match the identity of the sender. A mathematical function known as the Hash function best...
5 Pages(1250 words)Research Paper

Report on Public Key Encryption

..., the smartcard and a padlock for the private and public keys, respectively. Logically, any individual can access the public keys. However, the two types of keys work together. This paper, therefore, provides a detailed report on Public Key Encryption. Alice (public key) Kevin (private key) Combined key 12345678 (shared secret between Alice and Kevin) The above diagram shows that with the keys as identity, the two can share data or information. For example, Kevin could send Alice important data that he wants to ensure only she gets to read it. Therefore, Kevin encrypts the data with Alice’s public key since...
1 Pages(250 words)Assignment

Encryption of data in transit and data at rest

...is a process that allows users to encode their data using a certain key or a certain algorithm. Through the use of encryption a user is able to enhance the security of his or her data. Even though encryption of data does not necessarily restrict the access of data it however does ensure that a hacker is not able to interpret encrypted data and hence use it for personal benefit. Encrypted text is usually referred to as cipher text whereas unencrypted text is referred to as plaintext. Encryption is usually made use of for two basic data types, data in transit and data at rest. Data in transit usually refers to data that is on the move, whereas data at rest...
9 Pages(2250 words)Research Paper

Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic

...synchronously or asynchronously (Sumathi & Esakkirajan, 2007). The audit facility in DB2 enhances monitoring of information to maintain the integrity of the database. On the other hand, MS access has Data macros that enable tracking on the table level which is more efficient than using the tracking module (Friedrichsen, 2014). Encryption This involves the encoding of information to make it accessible using a decryption key which mainly work as final layer of defence. DB2 uses software, the Database Encryption Expert to encrypt database information for enhanced security against numerous threats. It has a function that ensures that applications can use the RC2 block cipher for data...
4 Pages(1000 words)Research Paper

SQL Server Column Level Encryption

...are exposed to two major categories of threats (Jayanty, 2011). Chiefly, restricting access to sensitive information is a basic protective approach to the firm’s data. However, considering that cyber-attacks comprise of a major threat to business and research firms, it is observed that access restriction is not enough. Consequently, encrypted data and restricted access to sensitive information suffers from the possible virus attack that can destroy the data rather than expose it. With this in mind, ABC Institute of Research and XYZ Inc. are vulnerable to losing data or having their research finding on genetics expose to their rivals. For this reason, column level encryption using symmetric keys (Aqarwal,...
2 Pages(500 words)Case Study

WiFi, VPNs & Encryption

...WiFi, VPNs and Encryption WiFi, VPNs and Encryption Affiliation In the past few years, there have emerged a wide variety of security attacks such as viruses, worms and so many other types of security threats. Though, there are also a number of ways to deal with these threats but there is not a single perfect solution to completely avoid these threats. Once a computer or a server has been infected with these viruses, it is necessary for the administrator to use the mechanism of least privileges in order to complete their tasks. Basically, this mechanism allows the system users to run their processes using the minimum privileges required to complete the users processes. In this scenario, different restrictions are implemented on the system...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Encryption for FREE!

Contact Us