[go: up one dir, main page]

0% found this document useful (0 votes)
19 views14 pages

Cryptography

Uploaded by

deskprecision
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views14 pages

Cryptography

Uploaded by

deskprecision
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1

Cryptography

Name

Course

Instructor

Date
2

Task 1: Understand Key Cryptographic Principles and Modes

Concept and Application of Cryptography

Cryptography is a natural manner that encrypts data into a particular form that cannot be

read without a unique key. It finalizes the secure data transmission and makes it safe from

unauthorized access while assuring that it is accurate and unaltered (Otte et al., 2020).

Cryptography is necessary in several cases, such as protecting communication, information, and

persons. It is an important component of present-day security, offering essential security to

information transferred through networks and stored on different devices.

Symmetric and Asymmetric Modes and Approaches

Symmetric cryptography, secret-key cryptography, uses the same key for encryption and

decryption. This method is convenient and can encrypt a lot of information, thus being practical.

However, the key has to be distributed and managed to be secure; that is the disadvantage. Some

of the frequently used symmetric key algorithms are the Advanced Encryption Standard (AES),

the Data Encryption Standard (DES), and so on (Bellizia et al., 2020). Asymmetric cryptography,

or public-key cryptography, uses one public key for encryption and a different private key for

decryption. Asymmetric algorithms that are widely preferred are the RSA process and Elliptic

Curve Cryptography (ECC) (Venkata et al., 2021). It is employed to provide symmetric vital

exchanges as well as digital signatures.

Cryptographic Methods and Standards in Communications Security

Cryptographic methods and standards are essential in protecting communications through

cyber-supporting networks or other equipment. These standards guide using sound cryptographic

solution systems that can withstand different invasions. For example, the AES is preferred for
3

encrypting data such as messages, while secure key exchanges use an RSA algorithm. Following

these standards means that information is protected when transferred and at rest (Kafader &

Ghafari, 2021).

Cryptography is also used to secure data in IT systems by preventing unauthorized access

to the data. This way, data is well protected from intruders, and only certain entities offered

permission can read the data. This protection can be realized on files, for example, on a hard disk

drive or during their transfer, email, or messages over the Internet connection.

Assessment of Cryptographic Standards

Cryptographic standards are tested for certain attack types and checked against regulatory

compliances. New vulnerabilities need to be addressed, and old protocols have to be changed,

and this calls for updates and audit of the cryptographic practices. To optimize security,

organizations need to keep up with the developments in cryptographic technologies, such as

adopting the best practices in cryptography (Otte et al., 2020).

Importance of Cryptographic Standards in Communication Security

Standards in cryptography are vital to protect communication linkage. They offer a way

of preparing methods of encryption that ensure data is not intercepted or altered in transit. By

generating a set of standards that must be followed, the effectiveness and reliability of the

encryption technologies can be established, decreasing the tendencies toward data leaks and

cyber-attacks.

Symmetric vs. Asymmetric Encryption in Practice


4

Symmetric encryption can be considered efficient and capable of handling large data sets;

however, using a single key presents a significant problem in key management. Asymmetric

encryption, with the management of public and private keys, does not have the problem of key

distribution, although it is slower and less efficient for encrypting large datasets. Hence, the two

forms are utilized separately; symmetric encryption is applied to the data, whereas asymmetric

encryption is used for key exchanges (Bellizia et al., 2020).

Ensuring Robust Cryptographic Implementation

To achieve high levels of cryptographic security, a good number of factors must be

considered when choosing algorithms and key management. AES and RSA are some of the solid

encryption algorithms that are to be selected according to the organization's security needs. Also,

the generation, storage, sharing, and periodic replacement of the keys should be considered to

enhance the security of the cryptographic systems (Kafader & Ghafari, 2021).

It is necessary to work cyclically with an update of cryptographic practices and their

audit, considering new threats and potential vulnerabilities. Organizations need to know when

there is a breakthrough in cryptography techniques and use it to ensure their data is safe. Thus,

following the standard cryptographic protocols and applying high critical control standards help

protect the correspondence and data (Otte et al., 2020).


5

Task 2: Understand Standards, Regulations, and Laws Related to Encryption

Critical Principles of Related Standards, Regulations, and Laws

Regulations, standards, and laws dealing with encryption are aimed at protecting critical

data, safeguarding privacy, and building confidence in the digital environment. The significant

principles are availability, integrity, and confidentiality of data. Access control grants permission

to specific users in the organization to review and share the data with other personnel. Data

integrity ensures that the information received and stored is not altered from when it was

collected. Proper data availability allows only authorized users to use the information when

required.

New laws like the General Data Protection Regulation (GDPR) the European Union has

adopted require organizations to implement strict measures to protect data, including through

encryption. Its goal is to put individuals in charge of their information and significantly penalize

offenders. HIPAA rules enforced in the USA have mandated the usage of encryptions in

healthcare organizations ' data. FISMA is the Federal Information Security Management Act that

specifies required measures for federal agencies to protect their information systems. Likewise,

standard frameworks such as the National Institute of Standards and Technology (NIST)

guidelines outline procedures organizations must employ when implementing cryptographic

solutions to improve their data security, as portrayed in the case (Limniotis, 2021).

Consequences of Non-Compliance

Punishment may ensue if an organization or an individual fails to adhere to encryption

standards, regulations, and laws. Various dangers exist for organizations that do not adhere to the

rules and regulations that apply to them: legal consequences, financial costs, and damage to the
6

organization's image. Penalties may include hefty fines and the non-implementation of

encryption measures, with numerous GDPR violation cases acknowledged in related regulatory

bodies. For instance, corporations that suffer losses because of leakage related to weak

encryption measures may incur significant penalties, legal proceedings, and loss of customer

confidence.

Security breaches caused by poor encryption allow the theft of private data, enabling

identity theft, fraud, and other illegal activities. For instance, businesses in the health sector that

do not adhere to the laid-down HIPAA standards are in danger of exposing patients' Information

to fraud and privacy infringement. This may also cause operational interferences since

organizations must alter operations to address existing severities and regulatory probes.

People also suffer due to organizations ' non-compliance with respective countries '

legislation. When organizations fail to ensure adequate protection of personal data, the private

též of individuals using the services provided by such organizations or dealing with them are at

risk of having their information compromised and accessed by unauthorized persons. This

discourages people from using digital services from the Internet to avoid falling prey to

companies that take advantage of their data.

Thus, in order not to experience the above adverse outcomes, organizations have a

paramount responsibility to adhere to specific standards, regulations, and laws. Great care should

be taken in how data is collected, processed, stored, and transmitted to ensure compliance with

the law's provisions; this can only be done by implementing the following key recommended

practices: periodic vulnerability assessment and penetration testing, mandatory training for the

employees, and encryption. By following these guidelines, violative information is safeguarded,

legal implications are averted, and stakeholder confidence is earned, as Yao et al. (2020) noted.
7
8

Task 3: Design an Encryption Plan and Courses of Action for a Given Organization

Methods of Attack Targeting Encrypted Data

No matter how effective and secure they may be, cryptographic systems can still be

threatened by several methods of attack. One is the guessing attack, in which the attacker tries all

possible combinations to access the password-protected gadget or account. An attack of this kind

becomes possible if the length of the key is small or the algorithm used needs to be sufficiently

reliable. The second category is the side-channel attack, which takes advantage of the physical

features of the cryptographic system; these are the timing of the system, power consumption, or

electromagnetic emanations to recover or guess the secret keys. These attacks can be powerful if

the implementation of the cryptographic algorithm reveals some information involuntarily

(Bellizia et al., 2020).

Cryptanalysis is another elaborate technique that involves analysis of the arrangement of

encrypted data to identify the pattern and guess the key. Mechanisms, including differential and

linear cryptanalysis, are used on the symmetric key algorithms. Man-in-the-middle attacks are

common in asymmetric cryptography since the attacker gains control of a conversation between

two parties and may amend the details. These methods bring the need to implement solid and

practical cryptographic algorithms and essential management techniques to the foreground.

Additional Encryption Methods

In addition to regular symmetric and asymmetric encryption, several other sophisticated

methods are available, including new security features. Homomorphic encryption is also a form

of encryption algorithm that enables computations with encrypted data without necessarily

having to decrypt the data first, thereby maintaining the data confidentiality even at the
9

computation level. It is most suitable in cloud computing, especially when data privacy issues are

involved. Another reduced technique is quantum cryptography, which utilizes the concepts of

quantization to create microscopic encryption systems that cannot be deciphered. Quantum key

distribution (QKD) enables two parties to share a secret key through a digital communication

channel with the confidence that any form of interception will be identified (Kafader & Ghafari,

2021).

Post-quantum cryptography is also emerging to safeguard Information against future

quantum computers capable of cracking present cryptographic algorithms. These methods

comprise creating new algorithms that are protected from quantum assaults and can guarantee

their stability in the future. Further, blockchain technology brings sheer decentralization

regarding data storage and verifying transactions; the created ledger is secure and transparent,

hence broadly improving trust.

Principles of Escrow and Recovery

Key escrow and critical recovery are essential to enhance data availability and business

issues within the organization. Key escrow is a process of providing the solution of the

encryption key to a trusted third party, and the solution can be retrieved under certain conditions

like the loss of the primary key or disability of the user. This mechanism is handy for

maintaining access to the encrypted data if the original key is lost or becomes unavailable. As for

the critical recovery systems, they offer ways of determining the lost keys without causing more

harm to the complete cryptographic system. It sometimes entails breaking the key into several

parts, with each part kept with a separate owner, and it is only when a certain number of them are

combined that the whole key is produced (Venkata et al., 2021).


10

Key escrow and recovery principles are instrumental in ensuring data recoverability,

which is essential in cases where data access drives business operations. Organizations must

apply such mechanisms wisely to avoid revealing new threats during recovery while providing

workable accessibility.

Importance of Robust Encryption Arrangements

Secure data security measures are essential for protecting information, complying with

the legislation, and preserving customers' confidence in digital activities. Irrespective of the

nature of the business that an organization is involved in, efficient encryption enhances perimeter

security. It protects financial data, personnel data, corporate content, and cultural capital. Also,

robust encryption frameworks ensure that organizations observe compliance standards of

regulations and act like the GDPR, HIPAA, and FISMA, which demand high levels of data

security (Otte et al., 2020). Applying strict measures in encryption practices also helps to build

customer trust because it implies that information about the consumers would be protected. Thus,

when more and more companies experience data leakage threats, organizations that value the

importance of encryption can offer their customers a more robust security guarantee.

Evaluating Existing Encryption Arrangements

Assessing the existing encryption arrangements requires analyzing the cryptographic

algorithms employed, the levels of protection accorded to the essential management procedures,

and the integrity of the solutions with the existing standards and legislations. The strength of the

cryptographic algorithms must be measured using the capability of the possible attack strategies,

including brute force and cryptanalysis. Said algorithms like DES should be substituted with

modern and more secure algorithms like AES or ECC.


11

Other elements to be captured should be the level of security in the critical management

process, such as getting, distribution, storage, and rotation of keys. Protection of the key is

crucial because even the best cryptographic algorithm will not work effectively if the intruder

obtains the key used. The legal and specific requirements for protection should also be examined

to confirm that the organization complies with all legal and regulatory requirements for the

security of data (Limniotis, 2021).

Designing an Encryption Plan

A significant number of steps need to be followed when designing an encryption plan in

an organization, and this begins by evaluating the nature of encryption necessary in an

organization. This entails identifying what kind of data requires encryption in the organizations,

which data is sensitive in the organization, and whether there is any regulatory compliance that

the organization has to meet regarding data encryption. Knowledge of these laid down factors

assists in establishing the degree of security that should be offered and the proper encryption

techniques to apply. To achieve the maximum level of protection, it is essential to bring attention

to the fact that the encryption strategy has to be designed according to the needs and risks faced

by the organization.

According to the assessment, the organization must choose good symmetric and

asymmetric encryption algorithms. Symmetric algorithms are suitable for extensive block data

encryption since they are fast. In contrast, asymmetric algorithms like RSA and ECC are ideal

for the secure exchange of keys and digital signatures. The selected algorithms must be immune

to various identified types of attacks and meet multiple industry standards and guidelines. Using

these standards, one can easily design a proper encryption program that ensures that the data is

safely safeguarded; hence, there is a need to embrace the use of ISO standards.
12

Critical management is an important aspect associated with the management of the

cryptographic system. This entails using secure practices to generate, distribute, store, and store

the key. Instead, keys should be generated by some very random and robust algorithms, and the

generated keys should then be stored in secure pieces of hardware or software. One procedure

that needs to be strictly followed is the occasional rotation of keys. Moreover, the critical

management practices must follow escrow of keys and recovery in case of loss of key to make

data available. These measures are considered helpful to avoid such access and to continue

operations in the case of an attack.

Encryption should fit seamlessly into the existing IT framework of an organization and

should not prove to be an additional hassle. Electronic encryption measures need to work hand-

in-hand with data storage, transfer, and access mechanisms so that they can be easily

incorporated into the systems and make the encrypted data as accessible as the plain data without

compromising operations. This implies using encryption wherever needed, like in databases,

files, and networks. Effective integration makes it possible to have the encryption mechanisms

working harmoniously in the context of the overall IT structure of the organization.

It is also necessary to establish a key escrow and recovery mechanism so that the backup

can be easily accessed if the information is required for legal reasons or in the event of loss. This

involves making an agent of the key and developing the proper procedures for key distribution.

These mechanisms have been designed so that the user's recovery process is secure enough. Still,

on the one hand, they do not create altogether new songs for unauthorized access. In this way, the

original relationship of an organization to the encrypted data is saved in case the primary key is

gone, or the user is compromised.

Recommended Courses of Action


13

According to the evaluation and planning of the encryption policy, organizations should

consider the following actions for proper encryption mechanisms. First, enhance key

management using secure methods for crucial creation, provision, protection, and update. Using

tamper-proof Hardware Security Modules or any other safe means of storing the keys can

significantly reduce the risks inherent in crucial exposure. As a next step, superior encryption

techniques such as HE and QC are suggested to improve extended security and protection from

new threats.

Key escrow and recovery are also essential to provide data with availability in case of

loss of keys or when the user is incapacitated. All these mechanisms should be well devised in a

way that can address security issues while at the same time allowing some level of accessibility.

It is suggested that the encryption strategies are to be audited repeatedly so that possible flaws

are detected. Cryptographic techniques have been evolving; thus, the encryption plan must be

updated to counter the new threats and vulnerabilities identified in the future.

Regulations and standards like GDPR, HIPAA, and FISMA should be complied with to

avoid penalties for protecting sensitive information. Finally, showing the willingness to

safeguard customers' data through encryption may create additional value for the organization

regarding customer trust compared to the competitors involved. This way, organizations are

provided with recommended courses of action for developing a coherent encryption strategy that

will comprise the security requirements and expectations of an organization or company,

protection of confidentiality and integrity of data, as well as contingency and continuity of

operation to enshrine credibility with clients and business partners.


14

References

Bellizia, D., Bronchain, O., Cassiers, G., Grosso, V., Guo, C., Momin, C., ... & Standaert, F. X.

(2020). Mode-level vs. implementation-level physical security in symmetric

cryptography: a practical guide through the leakage-resistance jungle. In Advances in

Cryptology–CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO

2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I 40 (pp. 369-

400). Springer International Publishing.

Kafader, S., & Ghafari, M. (2021, September). Fluentcrypto: Cryptography in easy mode.

In 2021 IEEE International Conference on Software Maintenance and Evolution

(ICSME) (pp. 402-412). IEEE.

Limniotis, K. (2021). Cryptography as the means to protect fundamental human

rights. Cryptography, 5(4), 34.

Otte, E., Nape, I., Rosales-Guzmán, C., Denz, C., Forbes, A., & Ndagano, B. (2020). High-

dimensional cryptography with spatial modes of light: tutorial. JOSA B, 37(11), A309-

A323.

VenkataGiri, J., & Murty, A. S. R. (2021, August). Elliptical curve cryptography design

principles. In 2021 International conference on recent trends on electronics, information,

communication & technology (RTEICT) (pp. 889-893). IEEE.

Yao, J., Zimmer, V., Yao, J., & Zimmer, V. (2020). Cryptography. Building Secure Firmware:

Armoring the Foundation of the Platform, 767-823.

You might also like