der wWo different worlds with respect to cryptographic applications 1 Consider t
ID: 3702312 • Letter: D
Question
der wWo different worlds with respect to cryptographic applications 1 Consider two World 1: the early 1970s; World 2: today The cryptographic applications discussed in this chapter belong to the second of these 'worlds (indeed, many were unimaginable in the first of these'worlds) At a fairly high and generic level, compare these two worlds'by considering the following issues for each of them. In each of the two worlds: (a) Who is using cryptography and for what applications? (b) What type of cryptography is deployed? (c) What security services are implemented? (d) What technology is used to conduct cryptographic operations? (e) How secure is a typical communication channel? (f) How secure are the 'end points' (the sender and receiver's local environ- ments)? (g) How reliable are the cryptographic mechanisms that are used? (h) How straightforward is key management? (i) Are there any security issues relating to cryptography in the first world that do not apply to the second 'world? that do not apply to the first 'world? effectiveness of cryptography has changed between these two worlds (i) Are there any security issues relating to cryptography in the second world (k) Summarise the discussion by commenting on whether the role and tions support a range of different cryptographicExplanation / Answer
a)
World 1 :
Those times only those having highly confedential data were using cryptography, even then the cryptographic methods are not that efficient.
World 2 :
In today's world each and every single person is using cryptographic methods weather to save passwords or to encrypt some personal methods and now the technology is much more efficient then those times.
b)
World 1 :
That time various kind of cipher machines were used there were no. of them and most of them were easy to decrypt.
World 2 :
Now, currently we are using algorithims, encryption techniques etc. for cryptography.
c)
World 1 :
Methods like one-time pads were used for security purpose practices like always using different techniques were amont the only ways to implement security services.
World 2 :
Increase on no. of bits for encryption using different complex algorithms are some of the best techniques in todays world to implement security.
d)
World 1 :
Technologies like crypto systems, cipher machines etc were used for conducting cryptographic operations.
World 2 :
Technologies like algorithims, hashing etc were used for conducting cryptographic operations.
e)
World 1 :
That time typical communication channel had zero or say very less security. Anyone with some basic devices can easily break in to gain information.
World 2 :
Now the typical communication channel have several layers of protection for security. Bypassing through those layers are huge tasks and are nearly impossible.
f)
World 1 :
Then the both ends are very much low level on security scale. There were always huge chances for leakage of data from both ends.
World 2 :
Now there are some possibilities for data leakage but on scale of security today's world is far more higher then the world of that time.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.