Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Cryptosystems are complex combinations of hardware and software that are used to

ID: 3902560 • Letter: C

Question

Cryptosystems are complex combinations of hardware and software that are used to transform plaintext messages into a series of unintelligible characters, known as cipher text, then back to their original plaintext form. “An encryption algorithm scrambles data by combining the bits in the key with the data bits; in decryption, the algorithm unscrambles data by separating the data bits from the key bits.” [1, NetAction] Encryption is at the heart of secure electronic communication, however it does not guarantee that a message will remain completely safe. The authenticity and integrity of an encrypted message requires the use of digital signatures and one-way hashes.
The two types of cryptosystems in use, symmetric and asymmetric, rely on the responsible use of keys and sound key management practices to preserve their security. The easiest way for an attacker to decrypt a private message is by obtaining a copy of the key used to encrypt it, since the strength of modern cryptosystems makes code breaking computationally unfeasible using today’s technology. “It should be emphasized that the strength of a cryptographic system is usually equal to its weakest link. No aspect of the system design should be overlooked, from the choice of algorithms to the key distribution and usage policies.”

Organizations with a need for intense information security, such as government agencies, law enforcement, financial institutions, businesses, and health care facilities, can leverage strong, modern cryptosystems to help ensure that their data is not accessible to outsiders. All cryptosystems use either asymmetric or symmetric encryption. Symmetric key systems typically operate more quickly than asymmetric systems, but they require a highly secure means of exchanging keys between users. Major symmetric systems include DES, Triple DES, AES,
Blowfish, and SkipJack. Major asymmetric systems include elliptic curve systems, RSA, and their associated authentication and repudiation technologies. There are important strengths and weaknesses of both types of cryptosystems that must be understood before selecting a solution. Performance, data type, data access, cost, community acceptance, strength of algorithm, and key management should all be determined in order to select the most appropriate solution. After a cryptosystem has been selected and implemented, it is critical that users understand how to safeguard their encryption keys. A strong key management process is essential to prevent unauthorized access to sensitive information. The strength of most current encryption algorithms is far beyond the
ability of computing technology to defeat, so the preferred method of attacking a cryptosystem is key theft.
Selecting a cryptosystem that provides a high level of security while meeting the business requirements of an organization is extremely important. Knowing the types of systems that are available, their strengths and weaknesses, and how to evaluate a system are key considerations when evaluating cryptographic technologies for an organization.


I need a research paper on this can you help please?

Subject: Cryptography.
Highly appriciated your help.

Explanation / Answer

Indeed, the methods of encryption are the core of security. What you are looking for is a thorough review/survey paper. You must look into the online journal libraries of IEEE / ACM for the literature required. Moreover, you can search on Google Scholar for a variety of relevant literature.

As few best pratices, always try to refer to:

1) Top tier conferences / journals

2) Good references sited at the end of a conference / journal paper

For the starters search with:

1) Papers: A survey on conventional encryption algorithms of Cryptography | Performance Analysis of Cryptography Algorithms | A Survey of Cryptographic Algorithms

2) Keywords: Cryptographic algorithms/ survey on cryptography technologies

Note: Do look into the references for a better desirable.

Hope this helps!

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote