In: Computer Science
This is a three part question. For each part the answer requires identifying an asymmetric encryption technique, hashing or both. As part of each question you need to discuss the technique to demonstrate your understanding of how the functionality (confidentiality, authenticity, integrity) is supported. You need to discuss the details of what the sender and receiver do and the key usage if applicable.
What technique is used to exchange messages between two parties ensuring confidentiality? Discuss.
What technique is used to exchange messages between two parties ensuring authenticity? Discuss
c. What technique is used to exchange messages between two parties ensuring integrity? Discuss.
a.
Ensuring confidentiality, a very key component of protecting information confidentiality would be Encryption. Encryption ensures that only the right person who knows the key can read the information. Encryption is very widespread in today’s world while interacting with one another through internet. It is the most effective way to achieve the data security. Secure Socket Layer and Transport Layer Security are the security protocols for communication over internet. Example: Internet Banking.
Other ways to make sure that the data remains confidential is to implement file permissions and access control list to restrict access to sensitive information and design of file permissions and access control lists must be kept as easy as possible for proper maintenance.
c.
Integrity means protecting information so that it cannot be customized by not permitted people. Information is only as valuable as it is perfect. Similar to the data confidentiality, encryption plays a prominent role in preserving data integrity. The data shared with another person within a company or externally to a third party or creating an automatic system report containing sensitive information, these all data should be encrypted to prevent the data or sensitive information of a company to be accessed and changed by the third person. The data stored on file shares allow encryption can prevent the data from being altered by malicious objective or being accessed by individuals who do not have access.
When accessing data integrity and designing security requirements it is necessary to ensure the level of encryption is sufficient to protect the integrity of the data, the more sensitive the data the higher the level of encryption that needs to be enabled.