ISSC321 Database Security Research Paper DRAFT

User Generated

Yvfun

Computer Science

Description

This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. The research paper specifications are as follows:

  • 8-10 pages (double-spaced) Times New Roman 12 pt font.
  • Must have Abstract, Table of Contents, Introduction, Conclusion and section headings
  • Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
  • In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!
  • You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.
  • Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
  • Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
  • Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
  • No Plagiarism
  • Use

scho

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: APPLIED CRYPTOGRAPHY

Applied Cryptography
NAME OF STUDENT
INSTITUTION
PROFESSOR’S NAME
DATE

1

2

APPLIED CRYPTOGRAPHY

Applied Cryptography
Table of Contents
Abstract
1.1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4
1.2 Information security and cryptography : : : : : : : : : : : : : : 4
1.3 Background on functions : : : : : : : : : : : : : : : : : : : : : : 5
1.4 Basic terminology and concepts : : : : : : : : : : : : : : : : : : : 5-6
1.5 Symmetric-key encryption : : : : : : : : : : : : : : : : : : : : : 7
1.6 Digital signatures : : : : : : : : : : : : : : : : : : : : : : : : : : 8
1.7 Authentication and identification : : : : : : : : : : : : : : : : : : 8
1.8 Public-key cryptography : : : : : : : : : : : : : : : : : : : : : : 8
1.9 Hash functions : : : : : : : : : : : : : : : : : : : : : : : : : : : 9
1.10 Protocols and mechanisms : : : : : : : : : : : : : : : : : : : : : 9
1.11 Key establishment, management, and certification : : : : : : : : :10
1.12 Pseudorandom numbers and sequences : : : : : : : : : : : : : : 10
1.13 Classes of attacks and security models : : : : : : : : : : : : : : :11
Conclusion

APPLIED CRYPTOGRAPHY

Abstract
The reason for this paper is to give an up-to-date treatise of the principles, techniques, and
algorithms of interest in cryptographic practice. Emphasis has been put on those viewpoints
which are most handy and connected. The reader will be influenced mindful of the essential
issues and indicated particularly related research in the writing where more inside and out talks
to can be found. Because of the volume of material which is secured, most outcomes will be
expressed without proofs. This likewise fills the need of not darkening the exceptionally
connected nature of the subject. This paper is planned for both implementers and specialists. It
describes algorithms, systems, and their interactions.

3

APPLIED CRYPTOGRAPHY

4

1.1 Introduction
Cryptography includes making composed or produced codes that enable information to be kept
secret. Cryptography changes over information into a configuration that is muddled for an
unapproved client, enabling it to be transmitted without anybody interpreting it once again into a
comprehensible organization, in this manner bargaining the information (Alfred et al, 1996).
Cryptography is the study of mathematical techniques in relation to parts of data security, for
example, classification, information respectability, element verification, and information source
validation. Cryptography isn't the main methods for giving data security, but instead one set of
techniques.
Information security utilizes cryptography on a few levels. The information can't be perused
without a key to decode it. The information maintains its integrity during transit and while being
stored. Cryptography additionally helps in non-renouncement. This implies neither the maker nor
the recipient of the data may assert they didn't make or get it. Cryptography is otherwise called
cryptology.
1.2 Information security and cryptography
Data Security – ensuring data in conceivably antagonisti...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags