Cryptography ✓ Solved

Cryptography

Cyber security is now a very important issue with regard to information systems and data exchange. Today, there is a widespread reliance on the internet for both commercial and social uses. The rise in internet dependence further increases the interest of malicious persons in the data exchange process. In response to cyber security threats that now present in multiple forms, there have been proposed solutions that have been tried for the last 80 years. Of them all, cryptography has proved to be one of the most effective solutions that organizations and businesses should strive to adopt.

However, the reliability of cryptography as a cyber-security tool has been criticized recently following the large data volumes being transmitted and the need for fast transmission of data. Further, availability of quantum computing causes cryptography to lose its use in the IT. There have been proposals for improving cryptography by various scholars and researchers. The need for improved cryptography is so vivid. The value of information in the 21st century continues to increase by day.

At the same time, the rise in concerns about the existing assurance of security in terms of availability, integrity, confidentiality, authenticity, and privacy of information and information technology systems is clear (Saeed, 2015). Therefore, while there is an increase in demand for IT applications and infrastructure, there is also a need for legally binding digital signatures that will ensure data protection at affordable prices. This will increase users’ assurance of security as they use the technology devices and systems and as they carry out serious personal communications and transactions.

Encryption is a technique known to safeguard information from third parties. This is a technique that requires individuals to encrypt data and information with some kind of algorithm that is only known by the parties involved. The individuals who are party to the information being shared are the only ones who can decrypt the information and use it. While encryption has been in use for long now, it has proved relatively ineffective in ensuring maximum protection to the information being shared. In response, strong security measures have been proposed, more powerful techniques that ensure that the information contained cannot be deciphered.

On a more positive note, cryptography is very important in protecting information, but from a government’s perspective, cryptography is not good because it keeps all private conversations and transactions secure and private even when criminals are involved (Claret, 2011). For law enforcement officers, criminal investigations involving crimes conducted via the internet are strongly hindered by cryptography. The varying perception of cryptography by policymakers and the public raises questions on whether cryptography should be regulated to aid in legal investigations.

In cryptography, plaintext which is in the form of characters, numbers, pictures, and words is the one that is encrypted. The receiver decrypts it after receiving it. When transformed into a form that cannot be read and understood, the data is called ciphertext (Kumari, 2017). It is simply meaningless and useless. Ciphertext is transmitted via the network and various procedures are involved to transform plaintext into ciphertext. The process involved to convert plaintext to ciphertext is called ciphering and the method is called encryption (Kumari, 2017).

Encryption is therefore the mechanism through which cryptography is achieved. In order to encrypt, a key is needed. The key is basically the encryption algorithm that has to be independent of the plaintext. Different keys result in different ciphertexts. The receiver uses the inverse of the key used to cipher to decipher.

Cryptography is meant to ensure data security from hackers, theft, corruption, and loss. As seen, encryption is a process involving keys and algorithms. Cryptologists continue to create stronger cryptography techniques that are hard to break. The existing cryptography techniques are nearly unbreakable. The current cryptographic methods make use of complex computations and sophisticated languages that cannot be broken even by other cryptologists (Burman, 2008).

Symmetric vs. Asymmetric Cryptography

In symmetric key cryptography, a secret key is used to send secret messages between two parties. In this case, both the sender and the receiver have a copy of the secret key (Kumari, 2017). In asymmetric key cryptography, both the sender and receiver of the message have two different keys (Kumari, 2017). The sender has an encryption key for encrypting the message, and the receiver has a private secret key for decrypting the message.

In 2018, the Defense Travel System of the Department of Defense (DOD) was reported to send out unencrypted emails that had attachments. The emails were sent to the wrong distribution list, revealing over 21,000 personal information of marines, sailors, and civilians (Raywood, 2018). This significant breach of data could have been prevented by a simple measure of cryptography. Such incidents underscore the necessity of employing effective encryption to safeguard sensitive information.

Importance of Cryptography

Cryptography deters cyber criminals and other intruders. When properly implemented, strong cryptographic systems are highly reliable (Domb, 2019). According to Gemalto’s Breach Level Index, around 1,000 data breaches compromised 3.3 billion records in 2018, a significant increase from previous years (Raywood, 2018). Conversely, only 2 percent of these breaches involved encrypted data, further emphasizing the importance of cryptography in securing sensitive data.

Organizations are encouraged to leverage cryptography to protect their data. Encryption not only serves as a form of authentication but also must remain confidential. Access controls that accompany encryption are crucial to mitigate the risk of untrusted personnel accessing sensitive data.

Effective Cryptography

It is essential to understand that ensuring data security through cryptography is a process. This process encompasses selecting suitable encryption methods, determining the data that needs to be encrypted, and other considerations. To effectively implement cryptography, several key elements must be considered: collaboration among management and staff, data classification based on sensitivity and risk, key management systems for securing encryption keys, and the identification of the appropriate encryption solution for the organization.

Moreover, successful encryption strategies require proper access controls to ensure that only authorized personnel have access to encrypted data. Staff training and compliance with regulations are also necessary to mitigate risks of non-compliance.

Conclusion

There is no ultimate security in information systems, and encryption does not guarantee complete protection against breaches. Nevertheless, encrypting data enhances an organization’s security posture and contributes to a comprehensive IT security strategy. With strategic planning around cryptography, organizations can navigate various encryption options to stay ahead of potential threats while reducing the risk of compliance issues.

References

  • Alkandari, S. B. (2017). Cryptography and randomization to dispose of data and boost system security. Journal of Cogent Engineering.
  • Domb, M. (2019). Modern Cryptography: Current Challenges and Solutions. IntechOpen.
  • Faiqa Maqsood, M. A. (2017). Cryptography: A Comparative Analysis for Modern Techniques. (IJACSA) International Journal of Advanced Computer Science and Applications.
  • Hair, J. (2018). 7 Key Elements of a Successful Encryption Strategy. Sirius Edge: IT Focus.
  • Bacelar Almeida, M. B. (2017). Jasmin: High-Assurance and High-Speed Cryptography. CCS '17: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.
  • Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science.
  • Praveen Kumar, P. K. (2018). Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. Journal of Network and Computer Applications, 108.
  • Raywood, D. (2018). US Marines Confirm 21,000 Details Exposed in Data Breach. Info Security Magazine.
  • Buchanan, W. J., & Lloyd, S. L. (2018). Lightweight cryptography methods. Journal of Cyber Security Technology.