Free Essay

Encryption and Its Uses in Communication

In:

Submitted By marcalle
Words 1437
Pages 6
Encryption is a very important aspect of our daily lives. Everywhere we go and everything we do now involves some sort of encryption technology. From turning on our cars to using a card access to gain entry to our workplace, encryption is there. More specifically, encryption in communication is a vital component to everyday life. Without encryption, our lives would be much different and unsecure.
According to Oded Goldreich (2004), There are 2 main types of encryption: One is called Symmetric-key and the other is public-key encryption (pp 375-376). The Symmetric-key algorithm uses the same cipher for both encryption and decryption. Conversely, the public-key algorithm requires 2 separate keys. One of these keys encrypts the text or message and the other decrypts it. A big drawback to using the Symmetric-key system is that both parties must possess the single, shared key (Mullen & Mummert, 2007). The public-key system kept both parties having separate keys that neither even knew about, but could still decipher the message. Encryption is defined as the activity of converting data or information into code. There are a lot of different ways that we use encryption. Cell phones, web browsers, wireless access, and computer passwords are all different types of communication encryption. Encryption is definitely not a new technology. It has been used by militaries and governments to communicate secretly for years. Cell phones are a prime example of the encryption we use today. In fact, they can encompass all of the categories that are to be discussed. For a cell phone to work, you must authenticate to a cellular network operated by a carrier. This process is encrypted between you and the carrier. The encryption/decryption is done by something called a SIM card. These cards are fairly new technology, being first made in 1991 (G&D). The card allows the carrier to authenticate the cell phone to be on their network, and then allow the communication to continue whether voice or data. Web browsers are another very common occurrence of encryption and decryption. When you login to your webmail, many times it is secured by what is called an SSL certificate utilizing the TLS protocol. This uses the previously mentioned public-key encryption process. The same process is used when accessing online banking, shopping carts, or any other secured website. A one or two-way communication channel is opened up between you and the website. Should it be intercepted, the keys would not match and the data not usable. Wireless access is another thing that uses encryption. While first encryption protocols were easily cracked, the new standard of WPA2 was born and adopted (WiFi Alliance). When connecting to a WiFi router, you are asked for a password. This is what holds the encryption key. If a end user doesn’t possess the password, they cannot get onto the wireless network. If the password is not very complex or is shared, then it is easier to have a compromised network. Once you are on a compromised network, your computer and devices are vulnerable to attack. The attacker may be looking to steal credit card information, bank logins, or they may infect your computer with malicious software. Lastly, computer passwords are probably the most important part of encryption in communication. Since most people use a computer to communicate, having a strong password is important. Once someone is able to gain access to your computer, they may be able to pose as you and that can be detrimental to your name and your business. When choosing a password make it something easy to remember for only yourself and nobody else. Include special characters and numbers too! Technology is ever evolving and it is becoming more and more prevalent in everyday life. With the move of technology consuming even the most menial tasks, security is going to be needed. Encryption will be a big part of keeping everyone secure. A lot of businesses no longer have physical keys to doors, but rather have keyless proximity cards. These cards are able to be “read” without being physically inserted into a reading device, such as older barcoded cards or magnetic-stripe cards (Norman pp.57-57). Even common household devices such as refrigerators now have WiFi access. Thermostats also can be controlled via the internet now. As you can see, technology is ever evolving and growing. It doesn’t seem to be slowing down at all.
Encryption is a great tool that is protection the assets of many companies. Referring back to an access card, companies rely on these to protect their buildings from unwanted access. Encryption definitely protects digital assets too. Many software products that we use are protected by a license or authentication key. This key is a special encrypted phrase that grants access to the software. It can prevent people from stealing software without paying for it. While some companies are viewed as being greedy, in all honesty it does cost time and money to develop software and products that people want to buy. These products need to be secured in the interest of the company because it is in human nature to be dishonest, disloyal, and to be a thief in many cases.
Going back almost ten years, companies were looking for ways to prevent game stealing. A pioneer in the gaming industry, Valve, took action by suspending 20,000 users who had stolen their software (GameSpot). While this was an example of how encryption was used to catch thieves, encryption can also be used to prevent unauthorized access. This is the case in many industries such as the gaming and software industry. The cost of doing business with encryption is very small. In fact, the cost of not encrypting content and communications would surely outweigh the cost just making sure things are encrypted. Not a lot of equipment is needed, however subscriptions to various products may be required. You may need several SSL certificates, staff to integrate encryption techniques, various other servers, etc. It all depends on each individual business and what their needs truly are. A small mom and pop store isn't going to need access cards and they won’t need several websites with secure page setup. On the other hand, if you were to be pioneering Amazon.com, you would need a lot of things. Secure warehouses with surveillance systems, electronic access, secure inventory management, and other things of that nature. There are both good and bad things about encryption. From a web browser perspective, the bad part is that a website may be slow when you initially connect to it. This is because the SSL connection between the server delivering the content and your computer must establish a relationship (HttpWatch). The good is that your communication should be much safer being transmitted. It may not be 100% secured, but it will be much better off than without security. Another negative about encryption is that people will continue to hack it. Due to this, encryption will need to become stronger, and that will always leave vulnerabilities in equipment and software that does not update. The good part about this is that there are always people working for the “good” side and attempting to make communication secure. Regardless of how anyone feels, encryption is a part of our everyday lives. It always will be as long as technology keeps evolving and as long as people want to communicate securely with one another. As long as there are 2 people needing to get a message to each other and there is a possibility of someone intercepting it, encryption techniques will still be used. G&D | History of Giesecke & Devrient (n.d.). In G&D. Retrieved July 28, 2013, from http://www.gi-de.com/usa/en/about_g_d/company/history/history.jsp
Goldreich, O. (2004). Foundations of Cryptography (Basic Applications ed., Vol. 2). Cambridge, United Kingdom: Cambridge University Press.
Mullen, G., & Mummert, C. (2007). Finite fields and applications. Providence, RI: American Mathematical Society.
Norman, T. L. (2011). Electronic Access Control. Amsterdam, Netherlands: Elsevier.
Thorson, T. (2004, November 23). Valve suspends 20,000 Steam accounts. In GameSpot. Retrieved July 31, 2013, from http://www.gamespot.com/news/valve-suspends-20000-steam-accounts-6113916
Top 7 Myths about HTTPS. (2011, January 28). In HttpWatch. Retrieved July 19, 2013, from http://blog.httpwatch.com/2011/01/28/top-7-myths-about-https/
WPA2™ Security Now Mandatory for Wi-Fi CERTIFIED™; Products (n.d.). In WiFi Alliance. Retrieved July 20, 2013, from http://www.wi-fi.org/media/press-releases/wpa2%E2%84%A2-security-now-mandatory-wi-fi-certified%E2%84%A2-products

Similar Documents

Premium Essay

Signcryption

...secure and authenticated way with an expense less than that required by signature then encryption?”. This was for the first time, since public-key cryptography has been invented, that the question is addressed in literature. He discovered a new cryptographic primitive, called signcryption, which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly smaller than that required by signature then encryption. The proposed cryptographic primitive is more efficient for both types of costs involved: computational cost and communication overhead. The computational cost represents how much computational effort has to be invested by the sender and by the receiver of the message. It is determined by counting the number of dominant operations involved. The communication overhead represents the extra bits which are appended to a message in case of a digital signature or encryption based on public key cryptography. Encryption and digital signature are two fundamental cryptographic tools that can guarantee the confidentiality, integrity, and non-repudiation. Until signcryption, they have been viewed as important but distinct building blocks of various cryptographic systems. In public key schemes, a traditional method is to digitally sign a message then followed by an encryption, named signature-then-encryption. In many applications, both confidentiality and authenticity are needed together. Such applications...

Words: 833 - Pages: 4

Premium Essay

History of Cryptography

...OF CRYPTOGRAPHY Contents 1. Introduction 2. Classical Encryptions (Ancient Times) 3. Classical Encryptions (Middle Ages) The Cipher of Mary Queen of Scots Vigenère Ciphers Uesugi Cipher 3 4 6 6 6 7 4. Modern Ciphers: Ciphers during World War I and the Emergence of Encryption Machines German Communication Cables Disconnected by the United Kingdom Zimmermann Telegram ADFGVX Cipher The Birth of Enigma 8 8 8 8 9 5. Modern Ciphers: Encryptions in the Computer and Internet Era DES Cipher Public-Key Cryptosystem RSA Cipher Decrypting the DES Cipher Responsive Action of Cipher Enhancements for SSL 10 10 10 11 12 12 6. The Future of Encryption 7. Conclusion: Enhancing the Effectiveness of Encryptions used for SSL References 13 14 14 2 © 2013 Thawte, Inc. All rights reserved. Thawte, the thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affi liates in the United States and in foreign countries. All other trademarks are property of their respective owners. 1. Introduction E ncryption and related technologies are widely and frequently used as a means of ensuring that information is secure, and their importance has been growing with the increasingly widespread utilization of the Internet. The use of encryption can be traced to as far back as about 3000 B.C., during the Babylonian Era. Encryption technologies evolved as they were used in military and political...

Words: 6411 - Pages: 26

Free Essay

Information Technology

...Lewis Unit 7 Encryption Types 1. (ECC) Elliptic curve cryptography - is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization. 2. commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape. 3. (3DES) Triple DES - a mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and the resulting cipher text is again encrypted with a third key). 4. Diffie-Hellman key exchange - is a specific method of exchanging cryptographic keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. 5. International Data Encryption Algorithm (IDEA)- is a block cipher. 6. Data Encryption Standard – Encryption cipher that is a product cipher with a 56bit key consisting of 16 iterations of substitution and transformation. 7. El Gamal encryption algorithm...

Words: 415 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment 1

...search for keywords in the encrypted data and use the encrypted data as an input to computation or comparison operations. Because decrypting data stored at the cloud servers may possibly expose its content to the provider servers at least, so it is advised that it is more secure to decrypt data only on trusted machines which are controlled by the user who is authorized to access the data. Figure 2.2 Basic Architecture for Preserving Data Privacy in the Cloud Figure 2.2 shows the basic architecture of encryption for privacy protection before sending it to the cloud server. The data remain encrypted in the cloud server and only authorized users can get the credential for accessing this encrypted data. The encrypted data can be decrypted only after the data are downloaded to an authorized user device or machine. In such scenario, the privacy of the data doesn’t depend on any implicit assumption of trust of the server or the service level of agreement (SLA). Instead, the protection of privacy or integrity completely depends on the encryption techniques used to protect the data [45ECC]. The other leftover issues are how to allow the authorized users and data owner to search...

Words: 1702 - Pages: 7

Premium Essay

Encryption in Today's Information Systems

...users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into the recent Heartbleed vulnerability. Encryption is at the heart of security in today’s networked world. When using the Internet, users are not always clicking around and taking in information passively, such as reading through their Facebook feed, a blog, or a news article. Often times, they are transmitting their own information while shopping online or registering for a website such as Twitter (Tyson 2014). Users take for granted the “behind the scenes” process of safeguarding the information they share while performing these day to day tasks. Simply put, encryption refers to any process used to make data more secure and less likely to be viewed or read by unauthorized or unintended parties (Tom’s Guide 2014). Encryption relies on the science of cryptography, which humans have used for thousands of years. Before the dawn of the information age, the majority of those who used cryptography were governments; particularity for their militaries. The Greek historian Plutarch recorded the use of simple cryptography by Spartan generals. The general and admirals would use a thin, wooden cylinder,...

Words: 767 - Pages: 4

Premium Essay

Data Security

...QoS in Network with time constraints”, it is clear that our work requires a deep understanding of three main topics: security, Quality of Service (QoS) and network applications with time constraints. These three fundamental topics will be addressed in this chapter. 2.1. Security In today's business environment, users demand seamless connectivity and stable access to servers and networks wherever they are: hotels, airports, homes, or remote offices. While these functionalities are useful for business, they can only be diffused as such if we can minimize the security risks of transmitting sensitive data across the Internet. 2.2.1. Security Definition (Security Properties) Protecting information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction in order to provide confidentiality, integrity, and availability is the main goal of information security [NIST 2009]. Security is the ability of a computer system to withstand external physical stresses (fire, flooding, bombs, etc.) or logic (input errors, intrusions, hacking, malicious logic, etc.); this is generally the direction chosen by specialists of security audit, when they must assess the risks related to a computer system [Deswarte 2003]. According to ITSEC (Information Technology Security Evaluation Criteria), security can be defined as a combination of three main properties: confidentiality, integrity, and availability of information [Office 1991]. ...

Words: 8305 - Pages: 34

Free Essay

Mobile Computing

...Security Issues in Mobile Computing Srikanth Pullela Department of Computer Science University of Texas at Arlington E-mail: pvssrikath@hotmail.com Abstract In the present mobile communication environment, lot of research is going on, to improve the performance of issues like handoffs, routing etc. Security is another key issue that needs to be considered, which comes into picture once the communication channel is setup. Many security protocols are being proposed for different applications like Wireless Application Protocol, 802.11 etc. most of them are based on the public and private key cryptography. This paper provides an insight on these cryptographic protocols and also looks into the current research project going on at Sun Microsystems Lab on wireless security. 1.Introduction With the rapid growth in the wireless mobile communication technology, small devices like PDAs, laptops are able to communicate with the fixed wired network while in motion. Because of its flexibility and provision of providing ubiquitous infrastructure, the need to provide security increases to a great degree. As wireless communication takes place mainly through the radio signals rather than wires, it is easier to intercept or eavesdrop on the communication channels. Therefore, it is important to provide security from all these threats. There are different kinds of issues within security like confidentiality, integrity, availability, legitimacy, and accountability that needs...

Words: 4692 - Pages: 19

Free Essay

Network

...controlled through the server. b. Complexity: Peer-to-Peer only required two computers connected together however client/server required special software to communicate between server and client. c. Operating Systems requirements: Peer-to-Peer required an operating system such as Windows XP or Appleshare to establish a network communication, however for client/server special software such as Novell Netware or Windows 2000 server must be installed on the client and server devices. d. Scalability: Peer-to-Peer e. Redundancy / backup: 2. Define the following: a. Router: is a device that connects two networks - frequently over large distances. b. Hub: is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network. c. Switch: is a small hardware device that joins multiple computers together within one LAN. Technically, network switches operate at layer two Data Link Layer of the OSI Model. d. Gateway: A device that acts as a go-between two or more networks that use the same protocols. In this case, the gateway functions as an entry/exit point to the network. 3. Name all the network devices that a Linksys WRVS4400N serves as? - Wireless N and G - Router/Gateway - SP1 Firewall - Quick VPN 4. Explain how a firewall can act to stop a “Denial...

Words: 669 - Pages: 3

Free Essay

None

...station to verify each other. Access points (APs) should use authentication and access control to grant access rights to requesting stations. A list of these authentication methods is listed below i) (OSA) Open System Authentication – provides no authentication and allows for a wireless station to associate with an access point using a random generated shared key. ii) (SKA) Shared Key Authentication – Follows a sequence of actions to authenticate a station attempting to establish an association. iii) (EAP) Extensible Authentication Protocol – Developed to add security to point-to-point (PTP) communications. 1) Encryption and data privacy – Encryption is a method that provides data integrity and privacy. There are two basic types of encryption that are commonly used to encode data on computer systems. These two are: iv) Symmetric Encryption System – Applies the same exact secret key to encrypt and decrypt data. Symmetric encryption is a secret key system. The Symmetric key encryption uses four different encryption modes: (1) (ECB) Electronic codebook (2) (CBC) Cipher-block chaining (3) (CFB) Cipher feedback (4) (OFB) Output feedback v) Asymmetric Encryption System – Uses a public key to encode data and a private key to decrypt data. Asymmetric encryption is a public key system. (5) Asymmetric encryption uses two keys, a public key that is not secret, and a private...

Words: 472 - Pages: 2

Free Essay

Nt2580 Class Notes

...10/29/13 Data encryption is the only thing that will secure data transmission. Powerpoint: Confidentiality: Keeps information secret from all but authorized people Integrity: Can enforce integrity with hashes Authentication: Provides a way to authenticate entities Non-repudiation: Prevents a party from denying a previous statement or action Cryptology in Business • Increasing concern about the security of data. • More sophisticated attacks • Tremendous growth of computer-related fraud and data theft • Data protection as a business priority Intrabusiness Security: Privacy, integrity, authorization, and access control. Interbusienss Security: Message authentication, signature, receipt and conformation, and non-repudiation Extrabusiness Security: Anonymity, time stamping, revocation, and ownership Applications and Uses • Cryptography uses can be found in categories, such as: o Anti-malware o Compliance or auditing o Forensics o Transaction security o Wireless security Symmetric Key Crypto Standards Triple DES (Data Encryption Standard): Consists of three passes of DES using multiple keys IDEA (International Data Encryption Algorithm): Uses a 128-but key and runs faster than DES Blowfish: Faster than DES or IDEA AES (Advanced Encryption Standard): Strong and fast. Defacto standard today. RC2: Designed by Ronald Rivest RC4: Used in Internet browsers Symmetric Key Principles • The same key encrypts and decrypts • Symmetric Algorithms...

Words: 365 - Pages: 2

Free Essay

Software

...Advance Encryption Standard Abhilash Kumar Pathak School Of Computer Application, Lovely Professional University, Phagwara, Punjab, India Address Ramdev.pathak@rediffmail.com 1) INTRODUCTION SECURITY:- A network is connection of various type of component I.e. collection of component set that called n\w. Security is the secure the data and component and not interrupts the external and internal terms of resource. CRYPTOGRAPHY:- A) A cryptographer is one who practices or studies cryptography, a field primarily involved with keeping secret information secret. Mode cryptography is mostly concerned with encrypting digital information. B) A cryptography is the convert data text in cipher format. CIPHER:-- 1) A cipher (pronounced SAI-fur) is any method of encrypting text (concealing its readability and meaning). 2) It is also sometimes used to refer to the encrypted text message itself although here the term ciphertext is preferred 3) Cipher throw actual data are convert secure formatted and not to access an unauthorized user. 4) A block cipher is one that breaks a message up into chunks and combines a key with each chunk (for Example, 64-bits of text). A stream cipher is one that applies a key to each bit, one at a time. Most modern ciphers are block ciphers. TYPES OF CRYPTOGRAPH:- 1. SYMMATRIC 2. ASYMMATRIC SYMMATRIC KEY:- ...

Words: 1072 - Pages: 5

Premium Essay

Implement a Vpn Tunnel Between a Microsoft Server and Microsoft Client

...client pool? The IP host range that was set up for the VPN had three IPs from 172.30.0.20 to 172.30.252 3. How many encryption settings are available from the remote access server? Which one is the best? Which one provides backward compatibility? There were three different encryption settings. They are Basic Encryption (MPPE 40-bit), Strong Encryption (MPPE 56-bit), and Strongest encryption (MPPE 128-bit). The strongest is the MPPE 128-bit encryption but it is not backwards compatible. The MPPE 40-bit is backwards compatible though. 4. During a remote access session how many times is a client asked to provide credentials? Is this an example of multi-factor authentication? Explain. I was only asked one time to login to the remote access through VPN, but if I was asked multiple times it would still not be considered multi-factor authentication. The reason for this is that multi-factor authentication is where there are different ways to authenticate who you are not just the same login over and over that is just considered authentication. 5. Why is it important to use strong encryption in both authentication and communication protocols? Explain. It is important to have strong encryption in authentication and communication protocols because the information will be traveling over the public internet where it can be intercepted but with a strong encryption the people who have intercepted this...

Words: 639 - Pages: 3

Free Essay

Android

...------------------------------------------------- ------------------------------------------------- COLLOQUIUM REPORT ------------------------------------------------- ------------------------------------------------- ON ------------------------------------------------- ------------------------------------------------- Data Mining ------------------------------------------------- ------------------------------------------------- Submitted as partial fulfillment for the award of ------------------------------------------------- ------------------------------------------------- MASTER OF COMPUTER APPLICATIONS ------------------------------------------------- ------------------------------------------------- DEGREE ------------------------------------------------- ------------------------------------------------- Session 2012-13 ------------------------------------------------- By + ------------------------------------------------- Jeetendra Kumar Maurya ------------------------------------------------- 1045914041 ------------------------------------------------- ------------------------------------------------- Under the guidance of ------------------------------------------------- MR. Vinod Kumar (Sr. Asst. Professor) ------------------------------------------------- ------------------------------------------------- ACADEMY...

Words: 6401 - Pages: 26

Free Essay

Green Works

...new ventures, e-businesses are subject to a variety of unique security concerns. Ads by Google Network Security Scan Antivirus, Network Management & Asset Tracking in 10 min or less! www.gficloud.com​/​Start-Trial 1.1 Viruses and Other Malware E-businesses count on their Web servers and computers to run smoothly to keep business humming along. Computers that communicate with other devices on the Internet have the potential to download malicious software like computer viruses, worms and other malware that can inhibit a machine's ability to function properly. Malware can potentially result in data loss or the need for maintenance, both of which can cost e-businesses time and money. Malware can also impair customers' ability to use their own computers and access e-business sites. According to Consumer Reports, malware cost consumers about $2.3 billion in 2010. 2.1 Software Bugs The term software bug sounds similar to a virus or worm, which are themselves types of malicious programs, but it means something different entirely. A software bug is simply a mistake or oversight in a computer program or website coding that makes the site or program behave in an unintended way. A bug could result in something relatively benign, like minor aesthetic errors on a website. On the other hand, a bug could potentially cause major problems like site crashes and allowing users access to data that they are not supposed to see. Related Reading: Business Security Inspection Checklist ...

Words: 2387 - Pages: 10

Premium Essay

Manet

...International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013) Applying Security to Data Using Symmetric Encryption in MANET Amol Bhosle1, Yogadhar Pandey2 Department of Computer science & Engineering,SIRT Bhopal Abstract-- Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. The security of such network is a major concern. To improve the security of such network, technique proposed here is securing routing protocol AODV through the use of Symmetric Encryption algorithm AES. This secures the data as well as preserves the confidentiality. Further future work to be carried as of node authentication using IP address and using the AODV routing protocol and digital signature scheme. Keywords-- Mobile ad-hoc, symmetric encryption algorithm, confidentiality, AODV, Digital signature, IP address The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing. C] Multihop Routing: Basic types of ad hoc routing algorithms can be singlehop and multihop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from...

Words: 2868 - Pages: 12