This is a research paper and week 2 and 5 work was attached for reference.

User Generated

fnena16

Writing

Description

Final Paper

Instructions for final paper submission in week 7.

In week 2 you started this journey where you selected a cryptography topic to write about, then in week 5, you submitted your outline. Now, put it all together and create a research paper with the following criteria.

The paper should include:

Cover page

  • paper title, name, course name/number, instructor's name, and the date of submission

Body of the paper

  • includes an introduction and conclusion
    • Approximately 1,600 - 2,000 words
    • Double-spaced
    • Well organized and well written

Optional

Include figures and/or tables, as needed

References and citations

*****At a minimum, use four scholarly references

NOTE: Do not use Wikipedia or another encyclopedia

Unformatted Attachment Preview

Running Head: VISUAL CRYPTOGRAPHY CRYPTOGRAPHY Introduction Running Head: VISUAL CRYPTOGRAPHY Visual cryptography (VC) is a technique which allows encrypted information (texts, images etc.) to be decrypted by using encoding system. To decode it does not require a computer, human eye can read the code and decode the information. This technique was proposed by Naor and Shamir in the year 1944. In this technique two images are required to get the correct code, one image contains the random pixels and another image contains secret information. It is not possible to retrieve information from only one of the images. Bothe images are necessary to understand the secret message. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging, multimedia and other fields. This technique can helpful in the stream of data hiding used in cybercrime, file formats etc. Visual Cryptography is used in many industries to hide the secret data from being available to all the general users. Visual Cryptography is used only secure communications where sender and receiver should know how to use their layers and keep them aligned. To reveal the secret information the receiver aligns the two layers and this can be done without the need for an encryption device or any other system. As long as both the layers fall into wrong hand the system is unbreakable. If one the layers get intercepted it is never possible to retrieve the encrypted information. The flexibility of using this technique in all the industries like pharmaceutical, financial, and health etc. References https://page-one.live.cf.public.springer.com/pdf/preview/10.1007/978-3-642-14298-7_5 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7784984 SECURITY ISSUES IN CRYPTOSYSTEMS 1 Security Issues in Cryptosystems a. WhatsApp description WhatsApp is a messaging platform that allows users of Android, iPhone, BlackBerry, Windows Phone and Nokia smartphone to exchange images, texts, audios and videos clips for free. Recently, WhatsApp has made significant growth since being acquired by Facebook back in 2014. SECURITY ISSUES IN CRYPTOSYSTEMS 2 This platform enjoys a large number of users, with an approximate of one billion users per month, and has been used to send more than thirty billion messages on a daily basis. In January 2015, WhatsApp launched a web interface and a desktop application. WhatsApp uses a web-based client, alongside different supporting platforms, that allows a user on a PC to sync with their phones and use the WhatsApp on their desktop. WhatsApp has recently strengthened their security by the addition of two-step verification feature and the use of end-to-end encryption. WhatsApp has added features like free WhatsApp voice calls, video calls and group calls to reach more users. b. Security issues with cryptosystems that will impact WhatsApp Despite WhatsApp strengthening its security features, some security issues are still evident. Some of these issues include; firstly, unencrypted backups. Messages sent through WhatsApp are usually end-to-end encrypted, so only your device can decode them. This ensures that the messages cannot be intercepted during their transmission but does not guarantee the safety of the messages while they are on the device. The second security issue is Facebook Data Sharing. Facebook added WhatsApp to the Facebook family in 2014 whereby they agreed to keep their data differently (Taneja, 2015). However, in 2016, WhatsApp changed their privacy policies and allowed the sharing of data from WhatsApp to Facebook. They agreed to ensure data security, but they had access to information like phone numbers used to register WhatsApp accounts and the last time when a user used that service. No information who be publicly available to Facebook, but instead, it would be hidden in inaccessible personal profiles. c. Impacts of these security issues to WhatsApp In Android and iOS devices, it is possible that a user can create a backup of their messages to Google Drive or iCloud, the backup contains the decrypted messages on the user’s device. The issues of WhatsApp backup being not encrypted means that someone can access your messages SECURITY ISSUES IN CRYPTOSYSTEMS 3 by accessing your daily backup copy, and since it is not possible to change the backup location on your device. Encryption keys also have vulnerabilities. Each user has a public security key that is used to verify the recipient of the message, and which protect the messages during transmission. These security keys change in cases where WhatsApp is being reinstalled or transferring WhatsApp data to a new mobile device (Wanda, 2018). WhatsApp can, therefore, access your data because when a security key changes, it forces you to resend the messages with a different key that can be used to unencrypt the messages being sent. Facebook data sharing is a significant security concern for WhatsApp users. This impacts WhatsApp in that; data sharing was turned on by default when Facebook took over WhatsApp, so users who were uncomfortable with this functionality would navigate to WhatsApp settings menu and turn data sharing feature off manually. This allows Facebook to eavesdrop and access encrypted messages by forcibly allowing the change and accessing of new security keys for WhatsApp users during message transmissions (Rösler, 2017). WhatsApp also forces new keys to be generated for offline users even without their knowledge and make the sender of a message reencrypt their messages with news keys if they have not been delivered. This re-encryption and rebroadcasting without users knowledge allows WhatsApp to successfully intercept and read user’s messages. The WhatsApp users will only receive notifications about changes in their security keys if they have enabled that feature in their settings. Change of keys allows WhatsApp to grant access to personal data. SECURITY ISSUES IN CRYPTOSYSTEMS 4 References Wanda, P., & J Jie, H. (2018). Efficient Data Security for Mobile Instant Messenger. Telkomnika, 16(3). Rösler, P., Mainka, C., & Schwenk, J. (2017). More is less: How group chats weaken the security of instant messengers signal, WhatsApp, and threema. Taneja, S., & Rawat, S. (2015). Social Networking Security Loopholes. IITM Journal of Management and IT, 6(1), 147-151. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, please see the attached paper. Have ...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags