...ALGORITHMS OF ENCRYPTION This method will used two different type faces slightly differing in weight (boldness). it will broke up the ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character). A=***** G=**BB* M=*BB** S=B**B* Y=BB*** B=****B H=**BBB N=*BB*B T=B**BB Z=BB**B C=***B* I=*B*** O=*BBB* U=B*B** D=***BB J=*B**B P=*BBBB V=B*B*B E=**B** K=*B*B* Q=B**** W=B*BB* F=**B*B L=*B*BB R=B***B X=B*BBB For example, our some secret message as above : To be or not to be that is the question. Whether ‘tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message. M E E T M E B E tobeo rnott obeth atist heque stion Wheth ertis H I N D T H E G noble rinth emind tosuf ferth eslin gsand arrow Y M A F T E R S sofou trage ousfo rtune ortot akear msaga insta C H O ...
Words: 274 - Pages: 2
...ICT-457 Network Security Sum-2013 HW-9 1. Provide the name of a link to 2 publicly available encryption software tools. http://export.stanford.edu/encrypt_ear.html https://www.cryptanium.com/?gclid=CLbz5Z7KlbgCFcU5QgodrC0APg 2. Explain the difference between symmetric and asymmetric key cryptography. Provide an example where each is used. Pg. 282/283. Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers. Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers. Symmetric key cryptography cannot secure correspondence until after the two parties exchange keys. Asymmetric key cryptography uses a cipher with two separate keys. One is for encryption and one for decryption. Correspondents do not first have to exchange secret information to communicate securely. With asymmetric key cryptography, an opponent can intercept everything and still not be able to decipher the message. 3. Explain why having an entity’s public key alone does not allow someone to decrypt a message. Pg. 288. Because it is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 4. Does a hash function ensure integrity or privacy? Explain your answer. Pg.309/310. Hash functions help to detect forgeries. They compute a checksum of a message and then combine it with a cryptographic function so that the result...
Words: 363 - Pages: 2
...Encryption Standards for Web Browsers Joaquin Javier Brown American Military University For every operating system connected to the internet, there must be a web browser to navigate it. Given the amount of risks posed by viruses and other threats on the internet, measures must be taken to secure one’s computer against these threats. From the standpoint of a user many types of software can be implemented to prevent intrusions and detect them once they’ve occurred. In spite of this there is still an element of risk. To combat this from the side of the programmer, there has been a type of encryption that controls data flow from work stations to the internet. The level of this is encryption across most internet surfing tools is set at 128 bits of encryption. 128 bits of encryption is extremely difficult to crack. It works by utilizing 128 character comprised of ones and zeros. The reason this standard is chosen is that it strikes a balance between complexity and efficiency. It would take longer than the average human lifespan to crack, which essentially means the cracker stumbled upon the correct key within the span of half the possible combinations (Bradford). Though there are stronger types of encryption such as the one time pad, it bears to reason that having to replace the key after every single web page is loaded is inefficient. Though 128 bit encryption is indeed powerful, there are other encryption types available to the public which are even stronger. Advanced Encryption...
Words: 533 - Pages: 3
...differently. Even though the Choctaw Codetalkers and Enigma Encryption Device were direct results of the failure of Zimmerman Telegram, the latter was used by the United States during the same period of World War 1. It is important to note here that there was already an encryption method which must have been ignored by the Germans. The One-Time Pad was already in use before the start of World War 1. This encryption method according to Nicholas G. McDonald in his Research Review explained that the one-time pad encryption algorithm was invented in the early 1900's, and has since been proven as unbreakable. The one time algorithm is derived from a previous cipher called Vernam Cipher, named after Gilbert Vernam. The Vernam Cipher was a cipher that combined a message with a key read from a paper tape or pad. The Vernam Cipher was not unbreakable until Joseph Mauborgne recognized that if the key was completely random the cryptanalytic difficultly would be equal to attempting every possible key. Another point worthy of mention is the mistake of sending the entire message in one transaction. As an Intelligence Officer I would have broken the message in shorter telegrams. The chances of intercepting all of the messages would have been very slim. McDonald, N. 2009 Past, Present, and Future Methods of Cryptography and Data Encryption: A Research Review University of...
Words: 276 - Pages: 2
...Commercial IT security solutions / products 1. Executive overview Three commercial IT security products are evaluated to solve the issue of cloud computing service security; including SmartCryptor, Trend Micro SecureCloud, and CloudPassage Halo. These three products were selected because they contain the similar features to protect the hacker or data lose on the cloud network. The features of their products are compared and contrasted to identify the most benefits to the users. I set the selection criteria including cost, features, how to use, security level, and company-fit. The CloudPassage Halo products shows the most powerful products, however, I found many features are duplicated to the network security features that may implemented together with the servers. The cost is considered high. I recommended the Trend Micro SecureCloud with powerful encryption algorithm (AES –standard) and be controlled by policy –driven KEY that can self-adjust to any organisation. The price is reasonable with their features. Moreover, in small company who uses the third-party cloud service, SmartCryptor is chosen as very budget (just $6/months), the use can add another level of security in file encryption and do not worry that others will access your file. To sum up, every products has their own advantage and disadvantage, the way of product selection should consider what we really need, the product feature is solve the problem, and the price should be reasonable. 2. Introduction Cloud...
Words: 2036 - Pages: 9
...Use Case Diagram: In this use case diagram we are used 2 actors and 5 use cases. Here the data owner and data consumer are the actors. And the remaining are use cases(upload files, attribute based key generation, secret key, master key, access data). How it works means, when the data owner wants to upload a file based on attributes in the form of encrypted data. Then only the file will be uploaded in the outsourced . and data consumer wants to access an outsourced file. The data consumer access some access policies then only he downloads the cipher text and it converts into a plaintext. Class diagram In the class diagram first the data owner wants to upload the file into the outsource decryption. The attributes of data owner are filename, file size, public key, secret key, master key the only the file will be uploaded in the cloud server. And the data owner consists of methods file upload(), file size(), key gen(),...
Words: 613 - Pages: 3
... Hashing values over single Encryption of a value When it comes to the common username and password verification, the most widely used mechanism for encryption is public and private key. While this level of encryption is good enough for protecting a password it does have a few downsides. 1. The Private key has to be kept confidential at all times if leaked all information is now accessible from any source. 2. A common username and password are contained in the payload of a packet that is encrypted. 3. Once the packet is decrypted, the server will store the credentials or compare them to previous credentials. 4. If a digital certificate is offered, is this a valid certificate or has it been tampered with in any way? With these four downsides identified it could be time to adopt what has been learned by FIDO. The main characteristics of FIDO are that your personal information is never exposed to a server. This is where FIDO has the edge over common login credentials, everyone is kept anonymous. The next stage is to develop a hybrid approach where the user has control of the information that is going to be used for login credentials. This could be done by saving the user’s first name, second name, age, address, country and email into a secure chip that can only be accessed using biometrics. When these values are hashed using SHA-256, the device will save the hashed string in place of the original value submitted. When each of the strings is converted...
Words: 1229 - Pages: 5
...1. At a company, you are responsible for securing a network server utilized primarily for data storage and internal application sharing as well as for securing numerous desktop computers connected to the network. Describe the access control that you would put in place for each and explain why. The more valuable your data, the more effort you should put into securing your firm's network servers. The following areas will help to maintain a server on the network. Firewall: It's important to ensure your server's built-in firewall is running and that you are also using at least one level of network firewall. This may be something as simple as a firewall on the router attached to the server. Placing a server on a network without a firewall is like leaving the front door wide open. Once the firewall is running, the next step is to turn off every port you don't need. If you are not using the port, you don't need it open on the firewall. Hardening: Getting the firewall running is only a start. A critical step is "hardening" the system. This is the process of trimming the machine of every piece of software it doesn't need to complete its assigned task. Every single piece of software is going to have an exploit. You want to reduce the machine down to the necessities to increase the security. This means removing software from the server box. If, for example, the machine is an e-mail server, then delete all office productivity applications, the Web browser, even games and...
Words: 1826 - Pages: 8
...1. Which one of the following statements is most correct about data encryption as a method of protecting data? D. It requires careful key Management 2. Explanation (one paragraph with citations). When protecting data with encryption methods, it is essential to properly manage all encryption keys. “Unless the creation, secure storage, handling and deletion of encryption keys is carefully monitored, unauthorized parties can gain access to them and render them worthless”, “ And if a key is lost, the data it protects becomes impossible to retrieve” (securing enterprise, 2010). Therefore, it is mandatory to have the correct security precautions in place to protect encryption keys. It is important to make backups of any encryption keys, and also of any changes that are made, in case originals are lost or data needs to be restored (Magalhaes, 2007). “Ensure that the backups are recoverable and an effective disaster recovery plan that details the recovery of the keys from backup is in place” (Magalhaes, 2007). Also, “storing the decryption keys with the encrypted data is bad practice, for this reason the keys should not be stored on the tapes that contain the encrypted achieved data” (Magalhaes, 2007). Making sure that the encryption keys are only available to approved users, and are kept in well-guarded areas, will help secure them significantly (Magalhaes, 2007). Make sure to Escrow the keys with a trusted third party (Magalhaes, 2007). “Ensure that you have a way of...
Words: 381 - Pages: 2
...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...
Words: 360 - Pages: 2
...them to unreadable format. 2. Which should be transmitted across the network—the plaintext or the ciphertext? Why or Why not? Cipher text should be transmitted across the network to send the information from point A to point B due to confidentiality. Just in case if it get intercepted so they can’t understand the message. 3. What is a cipher? A cipher is a specific mathematical process used in encryption and decryption. 4. What is a key? It’s a random string of bits and it’s also the other thing that encryption and decryption requires. 5. What must be kept secret in encryption for confidentiality? A key must be kept secret in encryption for confidentiality. As long as the key is secret both parties still have their confidentiality. 6. What is a cryptanalyst? It’s someone who cracks encryption and it could be done by brute force key cracking. But as long as key is longer brute force key cracking will take longer time. 7. Complete the enciphering in Figure 3-2 of your textbook. Cipher text: r w l y p j k n f c s d 8. Which leaves letters unchanged—transposition or substitution ciphers? Transposition ciphers because it moves letter around the messages but letters itself doesn’t change. 9. Which leaves letters in their original positions—transposition or substitution ciphers? Substitution Cipher because in this one character is substituted with other character but order of character doesn’t...
Words: 256 - Pages: 2
...Executive Summary: Patton Fuller community hospital uses the clinical system, which is an integrated suite of healthcare applications that support various patient care like registration and scheduling; clinical orders, chart entries and reviews for physicians, nurses, emergency department personnel, and other care providers; systems for lab technicians, pharmacists, and radiologists; billing systems and insurers; and outpatient systems for the hospital’s outpatient clinics.System is built on a two-tier, client-server architecture, where the client is responsible for the presentation logic and application logic, and the server responsible for the data access logic and data storage. It allows multiple users across the network to share the server’s resources. Since the Hospital has to follow HIPPA compliance and regulation law, Patton-Fuller Community Hospital will need to make sure encryption rules are applied to their system and data is protected. Below is the symmetric and asymmetric encryption method to be used. 1) Public Key 2) Private Key 3) IPsec Public Key (Asymmetric): This encryption method will give pair of keys Message is encrypted using the public key and can only be decrypted by private key. Example RSA, Advanced Encryption Standard (AES) * RSA – It is a public key encryption method * It is a standard encryption method especially used for transmitting data over internet. * It is cost effective solution with hardware based encryption method...
Words: 295 - Pages: 2
...data integrity is guaranteed. Both answers are impeccably worthy. b) “Confidentiality” means that messages are not readable to outcasts. Then again, the attacker can simply modify bits and so forth and hence alter the messages. The receiver can't see this in the general case as ‘data integrity’ is not gave. Note: you could contend that obvious modifications can be recognized by a receiver, e.g. in the event that the approaching plain content is clearly babble. Nonetheless, this obliges that the collector has some former "thought" of what the plain content should resemble. This is surely not the situation for a general transmission of information in binary. A further point in the event that will be that rearranging a solitary bit in the “cipher” may influence numerous bits in the decoded plaintext. Subsequently, the recipient would really need to have an exceptionally exact idea and identification of wrong values in the plaintext. c) The possible ways to detect delays are: - Timestamps: Add timestamps to messages. The timekeepers of sender and beneficiary must be synchronized and the beneficiary needs to have an exceptionally solid thought of system defer between him and the sender. This methodology needs ‘data integrity’. - Sequence numbers and receiver specifically ACKing messages: this can help if the sender does the real location. This methodology needs ‘data integrity’. - Rotating keys: this to some degree complex methodology includes changing the encryption key each few...
Words: 739 - Pages: 3
...Encryption Hierarchy: - A hierarchical encryption is key management infrastructure. Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys. Asymmetric keys and symmetric keys can be stored outside of SQL Server in an Extensible Key Management (EKM) module. The following illustration shows that each layer of the encryption hierarchy encrypts the layer beneath it, and displays the most en configurations. The access to the start of the hierarchy is usually protected by a password. Symmetric encryption policy: - There are several ways to include hidden content in a message. In the beginning of cryptology, using invisible ink was a common method. That style of actually hiding is still in use today and called steganography. However, the term encryption today usually refers to the use of an algorithm that is transforming a readable message into an unreadable one. To decrypt that unreadable message you need to know two things. The algorithm used to scramble the message and the key. While there are algorithms that do not require a key, they are not considered secure anymore and their use should be avoided. In fact, any cryptographic algorithm that requires keeping the algorithm itself secret is considered weak and should not be used. The best way to identify a strong cryptographic algorithm is to take a published algorithm and look at how many cryptologists have tried to break it unsuccessfully. If the algorithm itself is known...
Words: 656 - Pages: 3
...whether they are transformed in the same way (e.g., add or remove a randomly generated vector) or shuffled with the same order. To achieve this goal, we introduce a novel Blind Vector Transformation technique, under which each participant con- tributes a part of the vector transformation while any single one of the parties cannot recover the original vectors from the final transformation result. Therefore, with blind vector transformation, we could enable a party to match its interests with another's profile but, at the same time, to keep the interests as well as the profiles private.Matching protocol is based on paillier’s homomorphic encryption. Homomorphic encryption is a form of encryption that allows computations to be carried out on cipher text, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This is sometimes a desirable feature in modern communication system architectures. Homomorphic encryption would allow the chaining together of different services without exposing the data to each of those services. Homomorphic encryption schemes are malleable by design. This enables their use in cloud computing environment for ensuring the confidentiality of processed data. In addition the homomorphic property of various cryptosystems can be used to create many other secure systems, for example secure voting systems, collision-resistant hash functions, private information retrieval schemes, and many more. There...
Words: 1138 - Pages: 5