How does cryptography enhance security? When is the use of cryptography not justified?
Cryptography is fundamentally a technology that is used widely to encrypt and decrypt messages. In its most basic definition, cryptography is nothing but the art and science of writing or solving codes.
Hence, it is easily understandable that cryptography is helpful to us in hiding the secret information while sending them over a network. It ensures that our private message is not understood to all people even if we send them in public network and is meaningful only for the intended person.
Security aspects of information sharing involves authentication,
Confidentiality and Integrity. Cryptography provides us with all of
these.
Authentication means the process of identifying an individual based
on some unique signatures. So that the sender or source of the
message can be identified.
Confidentiality maintains the secrecy of the information. Even if
the message is passed to everybody, only the authorized person with
the key and knowing the decryption mechanism can actually extract
out information out of the message.
The term Integrity ensure that the message that was initiated at
the source end is recieved exactly at the receiver end without any
loss of data or alterations to it.
So,cryptography enhances security by checking on all these three aspects and overlooking of any of these three would mean the use of cryptography is not justified.
How does cryptography enhance security? When is the use of cryptography not justified?
Explain the purpose behind DNSSEC. How does it use cryptography to secure network traffic? How is it used by organizations to ensure network security?
2. RSA's Public Key Cryptography Standards is widely used by Internet security community. Select a standard that you find interesting and describe what it does. Use http://www.sis.uncc.edu/~yonwang/papers/pkcs.pdf as a helpful reference
Rabbit Proof Fence (choose one question) 1. How does the use of a wide-angle lens enhance the storytelling in Rabbit Proof Fence? 2. How does camera movement and camera angles enhance the storytelling in Rabbit Proof Fence?
Cryptography and Network Security A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters. Group of answer choices Transposition cipher Polyalphabetic cipher Monoalphabetic cipher Caesar cipher
Now, suppose Alice and Bob use random numbers to enhance security. Alice signs the combination of message MI-This is Alice" and a random number R1, then send M1, R1, and digital signature to Bob; and Bob does the similar thing. Is this secure? 9. M1- "This is Alice", R1, Alice_Sign(M1, R1) Alice Bob M2 "This is Bob", R2, Bob_Sign(M2, R2)
How does "segregation of duties" work when it comes to computer security?
Cryptography and Network Security The essential elements of any pseudorandom number generator are a __________ and a deterministic algorithm for generating a stream of pseudorandom bits. Group of answer choices secret key session key seed value stream encryption function
How does the selection of this objective enhance the health of the population? (Write 1 paragraph please) 1. Tobacco Use
Define the following terms and security objectives and give examples Symmetry-key Cryptography Asymmetric Cryptograph Access Control Nonrepudiation Revocation
Identify and describe the three main types of cryptography. In your answer provide an example of how each of these three main types of cryptography is used in provide appropriate security in a technology solution.