Wednesday, May 6, 2020

Annotated Bibliography On Encryption Techniques - 914 Words

ESSAY On ENCRYPTION TECHNOLGIES SATHYA AGILA SATHISH CHANDAR M.S (IST) IST 5500- FUNDAMENTALS OF IST WILMINGTON UNIVERSITY ABSTRACT Transmission of data from one place to another securely becomes a challenging issue in this highly technological era. Stealing the information becomes the full-time job of hackers. To send the data secretly, encryption algorithms are used. Many encryption techniques are evolving to protect the information being send. In this essay, two different encryption methods, Quantum Key Description and Honey Encryption were explained briefly. Also, this essay addresses their benefits and limitations and the areas in which the algorithms are used. INTRODUCTION: Encryption is a process†¦show more content†¦These algorithms have their own positives and negatives. New algorithms are evolving day by day. Two algorithms listed below are discussed in this essay. a) Quantum Key Distribution b) Honey Encryption. QUANTUM KEY DISTRIBUTION: This algorithm uses photons to transfer the data. Each data is represented by a single photon. There are two states of photon namely, polarization and spin. If the bit equals 1, then it is polarization and if the bit value equals 0, it is spin. A sequence of laser beam is generated in horizontal or vertical direction at the sender’s end. It is then transmitted and the receiver measures the rate of polarization. If the rate of error is too high, then the receiver can identify that somebody tries to hack the data. If a person tries to intercept the data, the photon gets destroyed and the interceptor must generate a duplicate photon. The properties of photon make the user impossible to generate an accurate duplicate. This increases the error. The zero error represents that the transmission is secure. Benefits of QKD: 1. Highly secure. 2. Data hacking is easily detectable. 3. Transmission over air is also possible. 4. Simple usage. 5. Easy maintenance. Limitations of QKD: 1. Expensive. 2. Cannot be used for long distance higher than 90 miles. 3. Ideal air condition is mandatory to transfer via air. Applications of QKD:Show MoreRelatedAnnotated Bibliography: Issue of IT Ethics2194 Words   |  9 PagesAnnotated Bibliography Over the last several years, the issue of IT ethics has been increasingly brought to the forefront. This is because of transformations occurring through rapid advancements and the way various applications are utilized. To fully understand what is taking place requires conducting an annotated bibliography on the subject and the impact it is having on these standards. These findings will highlight the overall scope of the challenges and the long term effects they are havingRead MoreAnnotated Bibliography: Security and Crime in Cyberspace3308 Words   |  13 PagesAnnotated Bibliography Over the last several years, the issue of IT ethics has been increasingly brought to the forefront. This is because of transformations occurring through rapid advancements and the way various applications are utilized. To fully understand what is taking place requires conducting an annotated bibliography on the subject and the impact it is having on these standards. These findings will highlight the overall scope of the challenges and the long term effects they are havingRead MoreA Research on the Internal Control for Information Security3378 Words   |  13 Pagesï » ¿Internal Control for Information Security PLEASE PUT THE TOPIC DEFINITION STATEMENT HERE AT THE FIRST PAGE PLEASE PUT THE ANNOTATED BIBLIOGRAPHY AT THE LAST PAGE BEFORE THE REFERENCE PAGE Introduction Control is a set of mechanism that assists an organization to attain the desired objective. Control is fundamental to achieve organizational goal, and control aligns the aspiration of workforce with their capabilities. On the other hand, internal control for information security is the practiceRead MoreManaging Information Security Risks: The Octave Approach1635 Words   |  6 Pageselements of information confidentiality as well as authenticity. The design of the mediators basic security mechanism is also outlined. This basis design uses the basic approach as well as concepts of system credentialing, authentic authorization, encryption as well as confidentiality. Butler, S. A. Fischbeck, P. Multi-Attribute Risk Assessment. SREIS 2002, Second Symposium on Requirements Engineering for Information Security. Raleigh, NC, October 16, 2002. Lafayette, IN: CERIAS, Purdue UniversityRead MoreDatabase Security28570 Words   |  115 Pagesaccess to a database each user has to identify himself to the computer system. Authentication is the way to verify the identity of a user at log-on time. Most common authentication methods are passwords but more advanced techniques like badge readers, biometric recognition techniques, or signature analysis devices are also available.  · Authorization, Access Controls Authorization is the specification of a set of rules that specify who has which type of access to what information. Authorization policies

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.