Question

In: Computer Science

Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word ​Abstract In...

Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word

​Abstract

In network communication system, exchange of data mostly occurs on networked computers and devices, mobile phones and other internet based smart electronic gadgets. Importance of network security is increasing day by day for various network and software applications in human life. Many of the human activities are automatic and in future more areas will come as part of networking system. So most of the end-devices will come to the internet and connect, it is important to ensure the security of data being transmitted. The data and network encryption algorithms play a huge role to ensure the security of data in transmission. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word to word transformations and transposition. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework,
and propose the usage of methods to prevent online security breaches

​ Introduction
Encryption simply means the translation of data blocks into a secret code which is considered the most effective way to ensure data security. To read a secret file one must have access to a secret key that enables to decrypt it. Unsecured data where no encryption algorithms were used travels through different networks are open to many types of attacks and can be read, changed or forged by any attacker who has access to that data or network. To prevent such attacks encryption and decryption techniques are employed. Encryption algorithms are used by many software and network applications, but most of them are not free from cyber-attacks. Now a days encryption techniques uses algorithms with a “key” to encrypt data into digital secret code and then decrypting it by restoring it to its original data. It is important to protect things like biometric information, email data, medical records, corporate information, personal data, legal documents, transactions details from unauthorized access. Encryption techniques uses a fixed length parameter or key for data transformation. There are mainly two types of algorithms used to encrypt data, asymmetric encryption and symmetric encryption. Many research and analysis of different encryption algorithms such as DES, 3DES, AES, Blowfish, Twofish, Serpent, RC2, RC5, are going on which helps to identify the pros and cons of algorithms in various platforms and application areas. Today's most widely used encryption algorithms fall into two categories: symmetric and asymmetric. Symmetric-key ciphers, also referred to as "secret key," use a single key, sometimes referred to as a shared secret because the system doing the encryption must share it with any entity it intends to be able to decrypt the encrypted data. The most widely used symmetric-key cipher is the ​Advanced Encryption Standard (AES​), which was designed to protect government classified information.
Symmetric-key ​encryption is usually much faster than asymmetric encryption, but the sender must exchange the key used to encrypt the data with the recipient before the recipient can perform decryption on the cipher text. The need to securely distribute and manage large numbers of keys means most cryptographic processes use a symmetric algorithm to efficiently encrypt data, but they use an asymmetric algorithm to securely exchange the secret key. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Blowfish, AES, RC4,DES, RC5, and RC6 are examples of symmetric encryption. The most widely used symmetric algorithm is AES-128, AES-192, and AES-256. In asymmetric​ key encryption, different keys are used for encrypting and decrypting a message. Asymmetric cryptography, also known as public key cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. The RSA encryption algorithm is the most widely used public key algorithm, partly because both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This Attribute provides a method of assuring not only confidentiality, but also the integrity, authenticity and non reputability of electronic communications and data at rest through the use of digital signatures. Diffie-Hellman, RSA, ECC, ElGamal, DSA. The following are the major asymmetric encryption algorithms used for encrypting or digitally signing data.

Solutions

Expert Solution

This research paper states about various encryption technique that can be used to protect data from malicious attacks.
As we know that in today's world every device has been connected to each other through network. Internet is the largest network that we have as of now. All the communication takes place through this network which means every message as well as crucial data will have to pass through this network. This raises the security concerns as data today is of utmost importance to everyone.
This gave birth to various encryption algorithms that can be used to protect our data. This paper is used to provide an overview of various such algorithms and encryption techniques.

First of all encryption simply means transforming our plain text into a secret code that can only be understood by the desired receiver. This is considered to be the most effective way to ensure data security. When we send a plain text to the receiver through a network, it can be easily intercepted in between by a malicious attacker and then he can easily read the message, change the text for his own good etc. There any crucial data should always be sent in encrypted format. Here crucial data may include things like bio metric information, email data, medical records, corporate information, personal data, legal documents, transactions details from unauthorized access.

These days encryption techniques uses algorithm that uses a fixed length parameter or key that is used by the sender to encrypt plain text and by receiver to decrypt the encrypted data to get back the plain text.

These algorithms can mainly be classified into two types:

1) Symmetric Encryption
2) Asymmetric Encryption

Each of these algorithms have their own pros and cons and research is still going on till date. So any algorithm should be chosen according to the requirement.

Symmetric Algorithm:
These algorithms are also referred to as shared secret-key encryption. In these algorithm both sender and receiver use only a single key to encrypt as well as decrypt the data respectively. This mechanism can be well understood by relating to a lock-key mechanism. Because we use the same key to lock and unlock the lock system. Since both sender sender and receiver should use same key therefore the key should be known to both of them(in other word shared among them).
For example, Advanced Encryption Standard (AES) is the most widely used symmetric key cipher, which was designed to protect government classified information .Blowfish, AES, RC4,DES, RC5, and RC6 are other such examples of symmetric encryption. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link.
Symmetric-key ​encryption is usually much faster than asymmetric encryption, but the sender must exchange the key used to encrypt the data with the recipient before the recipient can perform decryption on the cipher text.

Asymmetric Algorithm:
In these algorithms, we use two different keys for for encrypting and decrypting the message. This key pair is generated using a specific mathematical computation, which means the two keys are mathematically linked to each other. Any one of these keys can be made a public key and the other is called a private key. Public key is shared with everyone so that they can use it to encrypt the data and send it to owner of that public key. On the other hand private key is kept as the secret by the owner so that only he can use to decrypt the encrypted text received by him.
For example, the RSA encryption algorithm is the most widely used public key algorithm. Diffie-Hellman, RSA, ECC, ElGamal, DSA are other asymmetric encryption algorithm. The distribution of keys of symmetric cipher is done by using asymmetric cipher.


Related Solutions

Compose an Abstract and Introduction for a research paper on the Fiscal Policy that will touch...
Compose an Abstract and Introduction for a research paper on the Fiscal Policy that will touch all aspects
write a 500-word paper using APA Format please say which one is ABSTRACT,INTRODUCTION ,THE BODY AND...
write a 500-word paper using APA Format please say which one is ABSTRACT,INTRODUCTION ,THE BODY AND CONCLUSION AND REFERENCE.    Discuss why Enteral Nutrition is recommended over Parental Nutrion in critically ill patients who are hemodynamically stable and have a functional gastrointestical (GI) tract.
Select a research paper topic and develop an abstract. Write 150 word topic proposal for your...
Select a research paper topic and develop an abstract. Write 150 word topic proposal for your final project. Your topic needs to focus on a critical challenge in cybersecurity facing National Security Professionals. This challenge can come from technology, policy, international relations, economics, or any of the fields where the digital world brings its effects to bear. Think about recent cybersecurity incidents and events. What research question comes to mind when you think of cybersecurity challenges? Your topic proposals need...
write Abstract and introduction about ohm's law experiment (800-100) word: Abstract: Introduction:
write Abstract and introduction about ohm's law experiment (800-100) word: Abstract: Introduction:
Abstract of a research paper of using derivitives
Abstract of a research paper of using derivitives
Mexico’s Move to UHC Read the abstract and introduction (1st section following abstract) to the paper...
Mexico’s Move to UHC Read the abstract and introduction (1st section following abstract) to the paper found here: 7. Short answer: What is one challenge leaders in Mexico face when developing and healthcare system? a. 8. According to this article, approximately what percentage of the Mexican population is uninsured? a. 16% b. 41% c. 47% d. 50% 9. Short answer: What is the “unacceptable paradox” referred to in the abstract? a. 10. In what year what this article written? a....
Engineering Failure Research Paper Write a 2000 word research paper over the Takata Airbag failures. Please...
Engineering Failure Research Paper Write a 2000 word research paper over the Takata Airbag failures. Please make sure to add as much detail as possible. Must be in narrative form (not an outline); use 3rd person Double-spaced, 12 pt. Times New Roman font, with 1” margins Use of figures is highly recommended; provide proper citations Minimum of five different references cited with at least two from non-web based sources. Follow the Publication Manual of the American Psychological Association (APA); see:...
please describe below technology used, benefit, issue and conclusion in your words Technology Used Encryption was...
please describe below technology used, benefit, issue and conclusion in your words Technology Used Encryption was almost exclusively used only by governments and large enterprises until the late 1970s when the Diffie-Hellman key exchange and RSA algorithms were first published -- and the first personal computers were introduced. By the mid-1990s, both public key and private key encryption were being routinely deployed in web browsers and servers to protect sensitive data. Devices like modems, set-top boxes, smartcards and SIM cards...
Research Proposal Draft Write a 2-3-page paper addressing the sections below of the research proposal. Introduction...
Research Proposal Draft Write a 2-3-page paper addressing the sections below of the research proposal. Introduction Background and Significance of the Problem Statement of the Problem and Purpose of the Study Research Questions, Hypothesis, and Variables with Operational Definitions Research Question Hypothesis: Research and Null Identifying and Defining Study Variables Operationalize Variables -Using the following article.. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4323084/pdf/nihms642582.pdf
A research paper or an abstract for finance. "How significant it is to understand cash flow...
A research paper or an abstract for finance. "How significant it is to understand cash flow and time value of money?"
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT