Assignment

User Generated

enwh1720

Computer Science

Description

Can you please help me the below question.

Current encryption methods to prevent data leakage.

Note: need 12 - 13 pages document on above topic(Excluding Reference page and Title page).. And 11 - 12 slides ppt.

Please write Document in APA formate and citation and with Reference

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, Check the solutions.Thank you for your time.

Encryption Techniques
Application of encryption techniques and their
places of application

Introduction
• Encryption is the act of securing information transmitted over networks by changing it into
a form that is unreadable by human mind (Chen, Liao, Wang, & Liao, 2015).

• Encryption is important in that it allows for secure protection of data which has limited
access properties.

• The vulnerability increases when such data is being transferred from one storage location to
another over networks.

• Data is converted into ciphers that are difficult for the human mind to decipher and only
converted to normal text at the intended reception point. Encryption can be used in all
kinds of devices and across all networks from the internet to personal networks.


• There are many encryption techniques
used today with other methods emerging
as the need to secure date increases.
• The most common methods include the
public method and the private key method.
• The public Key encryption technique uses
a public key used by the recipient that is
mathematically generated.

Importance of encryption
• It can be used to secure and protect folder contents that
contain emails and other sensitive information such as
credit card numbers.
• It provides Security to sensitive Data at any time.
• Data stored is prone to tamper and misuse if not
encrypted.
• It secures data in storage and in transit

Public key encryption
• The public Key encryption technique uses a public key used by the
recipient that is mathematically generated.

• The public key of the intended recipient has to match with the
private key.

• This is an important tool as it can help unearth many hidden
mysteries and bring the culprits to book.

• But there could be adverse effects if the universal key falls on the
hands of untrustworthy people as they may use it to decrypt data for
their personal benefits.

Cryptography
• Cryptography is one way of encrypting data
• This technique helps secure information resources shared between different parties over
networks making it secure from getting into unintended hands.

• Cryptography techniques works by changing the state data from its initial format and making it
into unique way that cannot be understood and then decrypting it at the recipient end to the
readable format.

• Encryption is useful in securing data in transit over network platforms.
• One of the methods mostly used of this techniques is the symmetric key method.

A cryptography refers to a growing collection of methods that help in data security techniques.

• Every hash in a stream of data contains a unique cryptographic hash form the previous block

Encryption as a computing
paradigm
• Encryption computation is a basic principle in the current world, not just a concept consisting of a set of
computers.

• It refers to the patterns that have taken course through the many generation of computing infrastructure to
the current times.

• The computational pattern suggests that the universe can be usefully viewed as transcendent computers.
• The virtual analogy applied to the block chain since its invention been researched and applied in many
different areas by different researchers.

• Computational paradigm view the universe as virtual space in resulting from an information process in the
human senses.

• This technology is based on the encryption principle has changed the view of transaction security.
• It therefore means no real empirical description exists from coherent computational.

How secure is encryption ?
• This technology offers solution to insecurity issues where malicious people may

change records of transactions without being noticed, such an attack may mean a
situation where a cyber-criminal or a program is used to successfully alter or
manipulate transactional data.

• Many organizations have reported cases of sensitive data stored over the networks
being tampered with or otherwise lost.

• In case of a security breach in cloud service, cyber criminals gain access to such
sensitive data and this may see the collapse of a many organization.

• The effectiveness of the cryptography technique has come to seal this loophole.

Areas of application
• There are numerous areas where we can integrate the encryption technology.
• The main application of the encryption technology today is in crypto-currencies as
distributed ledger and most notably in Bitcoin.

• There are other few operational products that are supported by the proof of this
concept by 2016 (Pilkington, 2016).

• Some observers have remained skeptical on the use and application of this technology.
• Other areas of application include; bank institutions, crypto-currencies, in cloud storage and
in networking.

Strength of an encryption algorithm
There are different encryption algorithms used for this method. The algorithm depends on the
system involved and the type of data being protected. The strength of the symmetric key
method is define by its ability to protect information. The Strength of an algorithm depends
on various factors which including:
• Key secrecy.
• Difficulty of guessing. Long length keys are very difficult to guess.
• Difficulty in inverting algorithm
• Existence of back door keys.
• Ability to decrypt encrypted message
• The properties and type of the plaintext

Common algorithms used in encryption
Algorithm

Algorithm Description

Length of the Key

Blowfish

This ...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags