Access over 40 Millions of academic & study documents

Latest Advances Technologies

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/5
Running Header: LATEST ADVANCES NEW ENCRYPTION TECHNOLOGIES 1
Latest Advances New Encryption Technologies
The emergence of Information and Communication Technologies and the massive use of
digital communications have produced an increasing number of security problems. Transactions
that occur through the network can be intercepted. The security of this information must be
guaranteed. This challenge has generalized the objectives of cryptography to be the part of the
cryptology that is charge of the study of the algorithms, protocols, (they are called cryptographic
protocols) and systems that are used to protect the information and to give security to the
communication already the entities that communicate the first method of cryptography was in the
fifth century BR. Base on my research, I have found out several latest advanced encryption
technologies that have been used by many people today. Encryption has a much longer story than
we think ("Encryption", 2017). It was used by ancient Romans and Greeks to send confidential
messages using letters that could only be understood if they had a secret code. This process has
protected information from military, kings, and corporations for thousands of years, and is now
used all the time in the world of technology. Then, encryption could be defined as a process of
coding sensitive information to prevent it from reaching the hands of third parties who are not
authorized to view it. And the only way to understand the original content would be to use a
special key that would decode the information. In the world of technology, we see that
encryption is used in many ways to protect all kinds of data. For example, on many occasions,
we must provide our personal and banking data to make purchases on the internet, and for them
to be safe, web pages use encryption methods to protect transactions (although sometimes these
are deciphered by malicious entities). For this research, I have listed two examples of latest new
advanced encryption technology that is found in the below information.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
LATEST ADVANCE NEW ENCRYPTION TECHNOLOGIES 2
1. Fully Homomorphic Encryption
When it comes to processing private information, we have the problem that, in order to
process it, the service provider will know of at all times, since it receives it, while processing it
and once the result is obtained, which it will now before us. The interest in the complete
homomorphic cryptographic system is given by the fact that, because there are two operations
that are preserved in the system, it is possible to evaluate logic circuits in a homomorphic way,
that is to say, which encrypted inputs and outputs, which also allows constructing Programs in
which the data can be evaluated without having to decipher them (Greenberg, 1014).
When can it be used?
It is the feature that can be applied to certain asymmetric cryptosystems and allows a third
party who owns your public key to perform arbitrary calculations (addition and /or
multiplication) on previously encrypted. As a result of these calculations, it obtains new
messages, which are the numerical results of the operations. It could also use for delegating
complex processing to data centers that are not trusted, homomorphic encryption can also
be used for voting electronic.
Who are the users?
Cloud computing system and all the Telenet users
Advantages
Within a search engine, the user sends an encrypted request to this search engine, without
the latter being aware of the received request.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running Header: LATEST ADVANCES NEW ENCRYPTION TECHNOLOGIES 1 Latest Advances New Encryption Technologies The emergence of Information and Communication Technologies and the massive use of digital communications have produced an increasing number of security problems. Transactions that occur through the network can be intercepted. The security of this information must be guaranteed. This challenge has generalized the objectives of cryptography to be the part of the cryptology that is charge of the study of the algorithms, protocols, (they are called cryptographic protocols) and systems that are used to protect the information and to give security to the communication already the entities that communicate the first method of cryptography was in the fifth century BR. Base on my research, I have found out several latest advanced encryption technologies that have been used by many people today. Encryption has a much longer story than we think ("Encryption", 2017). It was used by ancient Romans and Greeks to send confidential messages using letters that could only be understood if they had a secret code. This process has protected information from military, kings, and corporations for thousands of years, and is now used all the time in the world of technology. Then, encryption could be defined as a process of coding sensitive information to prevent it from reaching the hands of third parties who are not authorized to view it. And the only way to understand the original content w ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4