Search icone
Search and publish your papers

Security of information systems: Implementation of encryption

Or download with : a doc exchange

About the author

Level
General public

About the document

Published date
Language
documents in English
Format
pdf
Type
thesis
Pages
4 pages
Level
General public
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Symmetric secret key encryption
    1. Data encryption standards
    2. Advanced data encryption standards
    3. Protocol Diffie and Hellman
  3. The asymmetric public key encryption
  4. Digital encryption
    1. Introduction
    2. Principle of the digital signature
  5. Security of exchange on internet
  6. Application
  7. Conclusion

The security of computer systems is generally limited to guaranteeing rights of access to data and system resources by implementing authentication mechanisms and monitoring to ensure that users of these resources have only those rights that they were granted. The security mechanisms in place can still cause discomfort to users and guidelines and rules are becoming increasingly complicated as the network expands. Thus, IT (Information Technology) security must be studied in such a way that does not prevent users from developing uses that are necessary, and ensure that they can use the information system with confidence. The concept of cryptography was born the moment man conceived ways of safeguarding his privacy and protecting certain facts/deeds from spies. From Julius Caesar and his army to Romeo and Juliet, encryption has been used over the ages in some form or the other. With the advent of net banking, technologically advanced military applications etc, the consumer world is riddled by many encryption requirements. Secrecy of communications on computer networks must be ensured and modern-day pirates must be prevented from infiltrating these networks of computers. Cryptography is used increasingly in various fields. Until recently, the security of these systems was based on secret information shared by users, and enabled confidential communication. For this reason, this system is called secret key cryptography. Secret key systems use algorithms utilizing the same key for encryption and decryption;this algorithms are called symmetric encryption algorithms. DES, AES, IDEA are the most more popular examples of these algorithms. Although these algorithms are still used for encrypting messages owing to very high speeds, they no longer satisfy the new consumer needs. Public key cryptography has been formalized and helps meet these needs. These offer solutions to new problems including identification, authentication and confidentiality of messages. Public key cryptography is involved in many everyday applications, the use of smart cards through mobile phones, or when a user logs in to a computer. However, the security of these applications depends mainly on two issues: number theory - the problem of factoring and the discrete logarithm problem. Although these two problems still hassle the cryptographers, the possibilities of a theoretical breakthrough or even quantum computers that would reduce the difficulty of solving them loom on the horizon.

Similar documents you may be interested in reading.

One dimensional cellular automata based security scheme with both authentication and confidentiality

 Science & technology   |  Electronics   |  Term papers   |  06/16/2009   |   .doc   |   11 pages

The mobile Operating Systems War

 Business & market   |  Management   |  Thesis   |  09/29/2010   |   .pdf   |   79 pages

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages