Thursday, May 21, 2020

Annotated Bibliography On Rsa Cryptography - 1900 Words

Introduction RSA cryptography is vastly used to encrypt and decrypt message while communicating through internet and in the field of digital signature. This encryption system is used regularly in web browsers, chat applications email, vpn and any other types of communications that require securely sending data to severs or the other people.[8] RSA cryptography is an asymmetrical cryptography system. Because it have two keys. One is public another is private. The encryption key is public while the decryption key is private. So only the person with the correct decryption key can decipher the encrypted message. Everyone have their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not easily†¦show more content†¦Which is by trying every possible combination. The length of the key determines the strength. DES uses a 64-bit key, but eight of those bits are used for parity checks, effectively limiting the key to 56-bits. So, it would take a maxi mum of 256 or 72,057,594,037,927,936 attempts to find the correct key. In present state, this is not safe because this amount of combination isn’t too high. Even so, up-to 1990’s mid this method was very popular and widely used. In 1998 a computer system broke this security in 56 hours which later reduced in 22 hours. So presently instead of providing compatibility in some instances, reliance on DES is a serious security problem for data confidentiality and should be avoided. As encryption strength is directly proportional to key size and 56-bit key length is not enough for present computing system so in 1997, the National Institute of Standards and Technology (NIST) announced an initiative to choose a successor to DES, in 2001, it selected the Advanced Encryption Standard as a replacement. [1] 2. Triple DSE method was designed to take the place of Data Encryption Standard (DES) algorithm. Triple DES was the recommended standard and vastly used symmetric algorithm in the industry. This system uses three individual keys each having 56-bits. So the total key length becomes 128-bits which is more secured than normal DES system. Although slowly became out of date Triple DES still capable manages to make a dependable hardware encryptionShow MoreRelatedA Research on the Internal Control for Information Security3378 Words   |  13 Pagesï » ¿Internal Control for Information Security PLEASE PUT THE TOPIC DEFINITION STATEMENT HERE AT THE FIRST PAGE PLEASE PUT THE ANNOTATED BIBLIOGRAPHY AT THE LAST PAGE BEFORE THE REFERENCE PAGE Introduction Control is a set of mechanism that assists an organization to attain the desired objective. Control is fundamental to achieve organizational goal, and control aligns the aspiration of workforce with their capabilities. On the other hand, internal control for information security is the practice

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.