5272021 Originality Reporthttpsucumberlandsblackboardcomwebapp ✓ Solved

5/27/2021 Originality Report 1/3 %24 %11 %5 SafeAssign Originality Report Summer 2021 - Cryptography (ISOL-535-A03) - First Bi-Term • Milestone 1 %40Total Score: Medium risk Vamsi Tumati Submission UUID: 97854b20-5ffe35-3dc39e98e2e7 Total Number of Reports 1 Highest Match 40 % Cryptography.docx Average Match 40 % Submitted on 05/27/21 03:49 PM EDT Average Word Count 715 Highest: Cryptography.docx %40Attachment 1 Internet (2) tutorialspoint springerprofessional Institutional database (3) Student paper Student paper Student paper Global database (2) Student paper Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 715 Cryptography.docx tutorialspoint 6 springerprofessional 4 Student paper CRYPTOGRAPHY 2 Cryptography Vamsi Tumati University of the Cumberlands Prof Wasim Alhamdani 05/30/2021 Cryptography is believed to have emerged together with the skill of writing because as civilizations advanced, people also got into various groups, tribes, and king- doms.

Those events resulted in the development of viewpoints like politics, supremacy, battles, and power which facilitated the normal need of persons to connect se- cretly with selective recipients which in turn made sure that cryptography evolved continuously with time. The sources of cryptography are associated with Egypt- ian and Roman civilizations. According to research, the first known substantiation of cryptography was drawn from the use of hieroglyph in which most of the Egyptian persons used to converse through written messages in hieroglyph (Reyad, 2018). The code which was used was only known to the scribes who shared information in place of the kings. Several Papal and Italian states resulted in the quick spread of cryptographic methods during and after the European Renaissance in which different studies and attack methods were examined in order to break those codes that were private.

In the 15th century, enhanced methods of coding like Vigenere coding emerged which presented moving letters in the message with many flexible locations instead of moving them to an equal number of locations. Cryptography ad- vanced from the ad hoc methods to encryption in the 19th century and then to a better refined art and science of information security. More advanced and efficient means of coding were provided in the early 20th century due to the innovation of electromechanical and mechanical machines like the Enigma rotor machine. Modern 5/27/2021 Originality Report 2/3 Source Matches (10) Student paper 100% tutorialspoint 69% tutorialspoint 76% Student paper 78% Student paper 100% cryptography is used as a method to secure messages and communication through the use of various codes in order to ensure that only intended persons can under- stand and process the information which as a result prevents unauthorized access to information.

Most of the methods that are used to protect information are ac- quired from mathematical theories and a collection of rules which are centered on calculations commonly known as algorithms to convert information into forms that make it difficult to decode it (Adamovic, et al., 2018). These algorithms are used for various purposes like web browsing on the internet, authentication to safeguard privacy of data, digital signing, cryptographic key generation, and protection of personal transactions like debit and credit card transactions. There are various types of cryptography such as hash function, asymmetric, and symmetric key cryptography. Asymmetric key cryptography follows a different and secure technique in the sharing of information.

With the help of keys, the sender and the recipient go with encryption and decryption practices. In this process, the public key is transmit- ted across the network while the private key is kept with every individual. Some forms of asymmetric key cryptography include PKCs, DSA, and RSA. In symmetric-key cryptography, the recipient and the sender of messages use a distinct key to both encrypt and decrypt the information (Ilayaraja, Shankar, & Devika, 2017). The more often form of cryptography used in this technique is advanced encryption system which is fully streamlined and quicker.

Block and stream cipher are used in symmet- ric encryption algorithms and although they are different, they share a common goal of securing information. Block ciphers break down plaintext messages into spe- cific blocks while stream ciphers break plaintext messages into single bits that are later changed into cipher texts. The cryptography algorithms consist of Advanced Encryption Standard, Twofish, RSA, and Triple DES. The Advanced Encryption Standard is the most trusted technique of the algorithm by the administration of the United States and it receives much applause for encrypting information in the private sector. The Triple-DES functions with three keys and this algorithm operate to make a reliable encryption answer for various banking organizations and other industries.

On the other hand, IBM cryptography incorporates cryptography into Dev- Ops, establishes crypto strategy and agility and also maintains confidentiality, privacy and integrity. Reference Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The importance of using software tools for learning modern cryptography. In- ternational Journal of Engineering Education, 34(1), . Ilayaraja, M., Shankar, K., & Devika, G. (2017).

A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10), . Reyad, O. (2018). Cryptography and Data Security: An Introduction. Student paper University of the Cumberlands Original source University of Cumberlands 2 Student paper The sources of cryptography are associated with Egyptian and Roman civilizations.

Original source The roots of cryptography are found in Roman and Egyptian civilizations 2 Student paper Cryptography advanced from the ad hoc methods to encryption in the 19th century and then to a better refined art and science of information security. More advanced and effi- cient means of coding were provided in the early 20th century due to the innovation of electromechanical and mechanical machines like the Enigma rotor machine. Original source Only after the 19th century, cryptography evolved from the ad hoc approaches to encryp- tion to the more sophisticated art and science of information security In the early 20th century, the invention of mechanical and electromechanical machines, such as the Enig- ma rotor machine, provided more advanced and efficient means of coding the information 3 Student paper There are various types of cryptography such as hash function, asymmetric, and symmet- ric key cryptography.

Original source The various types of cryptography include hash functions, symmetric, and asymmetric key cryptography 4 Student paper Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. Original source Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D 5/27/2021 Originality Report 3/3 Student paper 100% Student paper 100% springerprofessional 100% springerprofessional 100% Student paper 69% 4 Student paper The importance of using software tools for learning modern cryptography. Original source The importance of the using software tools for learning modern cryptography 5 Student paper International Journal of Engineering Education, 34(1), . Original source The International journal of engineering education, 34(1), Student paper Ilayaraja, M., Shankar, K., & Devika, G.

Original source Ilayaraja, M., Shankar, K., & Devika, G 6 Student paper A modified symmetric key cryptography method for secure data transmission. In- ternational Journal of Pure and Applied Mathematics, 116(10), . Original source A modified symmetric key cryptography method for secure data transmission In- ternational Journal of Pure and Applied Mathematics, 116(10), 301– Student paper Cryptography and Data Security: Original source Cryptography and information security Remove or Replace: Header Is Not Doc Title BUS-FPX3061 Assessment 4 Template Accounting Theory & Merchandising Accounting Respond to the following seven questions using grammatically correct language. Save the document and submit it in the courseroom.

1. Discuss the effects of all five major accounting assumptions on the accounting process. [Answer here] 2. Describe all five concepts' impact on the accounting process. [Answer here] 3. GAAP set forth standards or methods for presenting financial accounting information. Describe all five major accounting principles. [Answer here] 4.

In certain instances, companies do not strictly apply accounting principles because of modifying conventions or constraints. Identify and describe the impact on the accounting process of the three modifying conventions. [Answer here] 5. Correctly state the letter or letters of the principle(s), assumption(s), or concept(s) used to justify the accounting procedure followed for at least four of the accounting procedures. These procedures are all correct. â–ª Principle(s), Assumption(s), Concept(s): A. Business entity.

B. Conservatism. C. Earning principle of revenue recognition. D.

Going concern (continuity). E. Exchange-price (cost) principle. F. Matching principle.

G. Period cost (or principle of immediate recognition of expense). H. Realization principle. I.

Stable dollar assumption. â–ª Accounting Procedures: 1. Inventory is recorded at the lower of cost or market value. 2. A truck purchased in January was reported at 80 percent of its cost even though its market value at year-end was only 70 percent of its cost. 3.

The collection of ,000 of cash for services to be performed next year was reported as a current liability. 4. The president's salary was treated as an expense of the year even though he spent most of his time planning the next two years' activities. 5. No entry was made to record the company's receipt of an offer of 0,000 for land carried in its accounts at 5,000.

6. A supply of printed stationery, checks, and invoices with a cost of ,500 was treated as a current asset at year-end even though it had no value to others. 7. A tract of land acquired for 0,000 was recorded at that price even though it was appraised at 0,000, and the company would have been willing to pay that amount. 8.

The company paid and charged to expense the ,200 paid to Craig Nelson for rent of a truck owned by him. Craig Nelson is the sole stockholder of the company. [Answer here] Example: 1) Inventory is recorded at the lower of cost or market value. (C) 6. In each of the following equations supply the missing term(s): · Net sales = Gross sales - (______________________ + Sales returns and allowances). · Cost of goods sold = Beginning inventory + Net cost of purchases - ________ ________. · Gross margin = ________ ________ - Cost of goods sold. · Income from operations = __________ _________ - Operating expenses. · Net income = Income from operations + _________ ________ - ________ ________. 7. As part of the calculation for cost of goods sold it is necessary to determine the value of goods on hand, termed merchandise inventory.

Accountants use two basic methods for determining the amount of merchandise inventory. Identify the two methods and describe the circumstances (including examples of users of each method) under which each method would be used. [Answer here]

Paper for above instructions

Assignment Solution: Understanding Cryptography


Cryptography, the art of encoding and decoding messages, has evolved significantly from ancient times to the present digital age. It plays a critical role in securing information, ensuring confidentiality, integrity, and authenticity in communications. As we delve into its historical evolution, methods, algorithms, and applications, it becomes evident that cryptography remains a foundational element in contemporary information security.

Historical Context of Cryptography


The origins of cryptography can be traced back to ancient civilizations, notably the Egyptians and Romans. The first documented use of cryptography involved hieroglyphics, where scribes communicated sensitive information intended only for the ruling elites (Reyad, 2018). As societies grew in complexity, so did their requirement for secure communication, leading to the development of various encoding techniques throughout history. For instance, during the European Renaissance, the introduction of more complex methods such as the Vigenère cipher marked a significant advancement in cryptographic techniques (Adamovic et al., 2018).
By the 19th century, the field had shifted toward more systematic methods of encryption. Innovations included the development of mechanical devices like the Enigma machine, which played a crucial role during World War II (Reyad, 2018). This evolution from simple substitution ciphers to advanced mechanical and, ultimately, digital encryption illustrates how cryptography has kept pace with the complexities of society.

Types of Cryptography


Cryptography can be categorized into three major types: symmetric key cryptography, asymmetric key cryptography, and hash functions.
1. Symmetric Key Cryptography: This traditional form of cryptography employs a single key for both encryption and decryption. The most recognized method is the Advanced Encryption Standard (AES), which is widely utilized in various applications, from file encryption to securing internet communications (Ilayaraja, Shankar, & Devika, 2017). Symmetric key algorithms can further be divided into block ciphers and stream ciphers; the former processes fixed-size blocks of data, while the latter encrypts data bit by bit.
2. Asymmetric Key Cryptography: Also known as public-key cryptography, this method uses a pair of keys: a public key, which can be shared openly, and a private key, which remains confidential. This system enhances security by allowing individuals to exchange information without sharing their private keys. Algorithms such as RSA and Digital Signature Algorithm (DSA) are common examples of asymmetric cryptography (Adamovic et al., 2018). The primary benefit of asymmetric encryption is that it facilitates secure communication over insecure channels, such as the internet.
3. Hash Functions: Unlike the previous two types, which encrypt data for secure transmission, hash functions are used to ensure data integrity. They take an input (or 'message') and produce a fixed-size string of bytes, typically a digest that is unique to the given input. Any change to the input data results in a drastically different hash, making this method pivotal for verifying data integrity in storage and communication.
Each of these cryptographic techniques serves a unique purpose and is often employed in combination to enhance security measures across various platforms.

Applications of Cryptography


The applications of cryptography are vast and critical in today's digital landscape. For instance, it ensures the safety of online banking transactions, the privacy of personal communications on social media, and the integrity of software updates. Not only does it facilitate secure data transmission, but it also underpins systems like VPNs (Virtual Private Networks), SSL/TLS protocols (which secure web communications), and digital signatures (which confirm the authenticity and integrity of messages) (Reyad, 2018).
Moreover, the use of cryptographic techniques is paramount in protecting sensitive information from unauthorized access. For example, companies like IBM utilize cryptography within DevOps to protect customer data and maintain compliance with privacy regulations (Ilayaraja et al., 2017).

Challenges in Cryptography


Despite its advantages, cryptography faces several challenges that pose risks to secure communications. One major issue is the existence of vulnerabilities in cryptographic algorithms and their implementations. Notable failures, such as the compromise of the Enigma during World War II when the Allies cracked its code, highlight the potential for even sophisticated systems to be undermined (Reyad, 2018).
Additionally, the rapid evolution of computing power, particularly with the advent of quantum computing, raises concerns regarding the integrity of existing cryptographic mechanisms. Quantum computers have the potential to break widely used encryption protocols, necessitating the ongoing development of quantum-resistant algorithms (Adamovic et al., 2018).

The Future of Cryptography


As the digital landscape continues to evolve, so too does the field of cryptography. The future will likely see enhanced algorithms that leverage advancements in artificial intelligence and machine learning to automate the detection and mitigation of threats. Moreover, the ongoing exploration of quantum cryptography offers promising solutions for creating virtually unbreakable encryption methods.
Finally, as data privacy regulations tighten worldwide, organizations will have to ensure they adopt robust cryptographic practices to protect user information and comply with legal requirements (Ilayaraja et al., 2017).

Conclusion


In summary, cryptography has undergone a remarkable transformation from its ancient origins to its current status as a cornerstone of information security. Understanding its historical development, types, applications, challenges, and future prospects is essential for anyone involved in the technological sphere. By continuously advancing this field, we can protect vital information and foster secure communications in our increasingly interconnected world.

References


1. Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The importance of using software tools for learning modern cryptography. International Journal of Engineering Education, 34(1).
2. Ilayaraja, M., Shankar, K., & Devika, G. (2017). A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10).
3. Reyad, O. (2018). Cryptography and Data Security: An Introduction.
4. Stinson, D. R., & Paterson, M. (2018). Cryptography: Theory and Practice. CRC Press.
5. Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
6. Rivest, R. L., Shamir, A., & Adelman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120-126.
7. Schneier, B. (2015). Secrets and Lies: Digital Security in a Networked World. Wiley.
8. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall/CRC.
9. Carbone, M., & Sitaraman, M. (2009). Asymmetric Cryptography: Which Key Should You Use? IEEE Security & Privacy, 7(3), 62-65.
10. Kahn, D. (1996). The Codebreakers: The Story of Secret Writing. Scribner.