Cryptography Case sample essay

StudyAcer homework Experts at a Glance, Save Time and Excel

Writer avatar
Dr.Emma

Rating: 5/5    Reviews 482

Success rate 96%

Completed projects: 783

Hello, I am Prof Writers, I am a bold, accurate, and experienced tutor committed to providing clients with high quality, original, and timely work. As a writer, proficiency in several disciplines in academic writing is necessary, and that is why I prioritize on delivering quality and appropriate work. Be assured that I will always follow the lai...

Writer avatar
Dr.JamesPhD

Rating: 4.9/5    Reviews 373

Success rate 100%

Completed projects: 592

Hello, I am a full-time professional freelance writer with over 6 years experience in academic writing. I have a PhD in Strategic Management and have done several projects in business management, marketing and other subjects. This experience has helped me reinforce my ability to work in various fields and handle simple and complex topics. I am a...

Writer avatar
Dr.Success

Rating: 5/5    Reviews 1326

Success rate 99%

Completed projects: 1976

Hello :) My name is Dr.Success, I've started on my path as a professional writer mostly by writing essays. However, in the years since then, I've written various other academic papers, from research works to book reviews. From Sydney to New York, there are hundreds of students all over the world that are happy with the services I've provided the...

Writer avatar
MarvellousTutor

Rating: 5/5    Reviews 371

Success rate 100%

Completed projects: 1173

Hi there! Im MarvellousTutor, your perfect author with huge writing experience in English, Art and Business. What? Need assignment on another subject? No worries: I can deal with anything! If you're dreaming of the reliable, responsible and always-on-time writer, here I am! I manage my time greatly, thus, your deadline is highly important for me...

Writer avatar
Prof_Stephen

Rating: 4.7/5    Reviews 891

Success rate 96%

Completed projects: 1136

Hello there! My name is Prof Stephen. I have been a full-time freelance researcher and writer for a period of over 6 years. I have successfully completed over 1000 projects and assignments. I have had a good professional relationship with my clients who always come back for more quality papers since I highly value quality, professionalism, and i...

Writer avatar
Prof.TzKelly

Rating: 4.9/5    Reviews 244

Success rate 98%

Completed projects: 479

I'm ProfTzKelly, talented wordsmith, grammar afficionado, and writing machine. I'm written everything from outlines to screenplays and book reviews to advanced research papers. All you have to do to be well on your way to a great grade is chat with me! I'm experienced in all major styles, including APA, MLA, Chicago, Harvard, and Vancouver. You ...

Writer avatar
ProfAcer

Rating: 5/5    Reviews 465

Success rate 96%

Completed projects: 852

Hey! My name is ProfAcer, and my goal is to help you to get through a tough period of your life. I've been a student, and I know that the amount of work some professors expect you to do can be unfair and overwhelming. And that's without even accounting for the job you probably have an active social life each student should have. There is no sham...

Writer avatar
ProfessorEunice

Rating: 4.9/5    Reviews 412

Success rate 97%

Completed projects: 719

In academic writing, quality, originality, and deadlines are vital, and these are my primary offerings to all my clients. I have two years of experience as a full-time academic writer, with over 300 finance, economics, marketing, business, and general papers written from scratch. Since joining this site, I have also tackled sociology, healthcare...

Writer avatar
Think_Tank

Rating: 4.8/5    Reviews 319

Success rate 100%

Completed projects: 584

Hello! People call me ThinkTank, and I've been earning money as an academic writer for years. With a lot of works under my belt, you can bet that I've dealt with dozens of various topics and different forms of papers, including essays, research papers, and even dissertations. I like the challenge that comes with this job. I first fell in love wi...

Cryptography Case sample essay

Do Not Copy. Order Custom, Original Paper.

ABSTRACT

Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control. .

Encryption is the process of transforming text into an unintelligible form called cipher. Data encryption is the process used to hide the true meaning of data. Reversing the process of encryption is called decryption. Encryption and decryption comprise the science of cryptography as it is applied to the modern computer. Data encryption is achieved through the use of an algorithm that transforms data from its intelligible form to cipher. An algorithm is a set of rules or steps for performing a desired operation. An algorithm can be performed by anything that can be taught or programmed to follow a specific and unambiguous set of instructions

INTRODUCTION

encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. In anencryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext. This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext, should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm, to randomly produce keys.

Methods Of Encryption

There are two types of cryptosystems: secret key and public key.

In secret-key cryptography, also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret-key cryptosystem in use today is known as DES, the Data Encryption Standard.

In public-key cryptography, each user has a public key and a private key. The public key is made public whilst the private key remains secret. Encryption is performed with the public key, while the private key is used for decryption. The RSA publickey cryptosystem is the most popular form of public-key cryptography. RSA stands for Rivest, Shamir, and Adleman, the inventors of the RSA cryptosystem.

In both cases the encryption can be applied in either a block or stream cipher.

Block Cipher

A block cipher is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length. This transformation takes place under the action of a user-provided secret key.

Decryption is performed by applying the reverse procedure to the ciphertext block, whilst using the same secret key. The fixed length is called the block size, and for many block ciphers, the block size is 64 bits. In the coming years the block size will increase to 128 bits as processors become more sophisticated.

Stream Cipher

A stream cipher is a type of symmetric encryption algorithm. Stream ciphers can be designed to be exceptionally fast, much faster than any block cipher. While block ciphers operate on large blocks of data, stream ciphers typically operate on smaller units of plaintext, usually bits.

The encryption of any particular plaintext with a block cipher will result in the same ciphertext when the same key is used. With a stream cipher, the transformation of these smaller plaintext units will vary, depending on when they are encountered during the encryption process. A stream cipher generates what is called a keystream, which is a sequence of bits used as a key. Encryption is accomplished by combining the keystream with the plaintext, usually with the bitwise exclusive- OR operation. The generation of the keystream can be independent of the plaintext and ciphertext, yielding what is termed a synchronous stream cipher, or it can depend on the data and its encryption, in which case the stream cipher is said to be self-synchronizing. Most stream cipher designs are for synchronous stream ciphers.

What Is DES?

NIST¹ issued the Data Encryption Standard (DES) in 1977 to provide an encryption algorithm for use in protecting federal unclassified information from unauthorized disclosure or undetected modification during transmission, or while in storage. The standard required NIST to conduct a review every five years to determine whether the cryptographic algorithm specified by the standard should be reaffirmed, revised or withdrawn. The first review resulted in the re-affirmation of the standard in 1983; the standard was re-affirmed in 1988 following a second review; the third review was completed in 1993.

FIPS 46-2, which was issued following the third review, re-affirmed the DES until 1998. In recent times the security of DES has been in question, however no other non-DES standard has been presented. In October 1999 NIST released FIPS 42-3. This reaffirmed DES and at the same time ratified DES3, Triple DES or TDEA as the standard required for the encryption of nonstrategic data. In a recent article, cryptography expert Bruce Schneier responding to an FBI statement on the security of DES and TDEA was quoted “….there isn’t enough silicon in the galaxy or enough time before the sun burns out to brute- force triple-DES” (Crypto-Gram, Counterpane Systems, August 15, 1998).

The DES is based on work of IBM and has been adopted as the American National Standard X3.92-1981/R1987. The DES is a publicly known cryptographic algorithm that converts plaintext to ciphertext using a 56-bit key. The same algorithm is used with the same key to convert ciphertext back to plaintext, the process called decryption.

The DES consists of 16 “rounds” of operations that mix the data and key together in a prescribed manner using the fundamental operations of permutation and substitution. The goal is to completely scramble the data and key so that every bit of the ciphertext depends on every bit of the data plus every bit of the key (a 56-bit quantity for DES or 168-bit for Triple DES).

Authorized users of encrypted computer data must have the key that was used to encrypt the data in order to decrypt it. The unique key chosen for use in a particular application makes the results of encrypting data using the algorithm unique. Using a different key causes different results. The cryptographic security of the data depends on the security provided for the key used to encrypt and decrypt the data. The outcome of implementing the DES algorithm is that a cipher text is produced which has one key of a sequence of 256 or 70,000,000,000,000,000 (seventy quadrillion).

Figure 1, below shows the fundamental operation of the DES encryption process, (implementing ECB mode).
Notes
1 NIST – National Institute of Standards & Technology, formerly the National Bureau of Standards
(USA)
EXAMPLE:
A 64 Bit block of data is presented to the encryption engine. An initial permutation of the block is made. Figure 1. (DES Function) The block is then divided into two32 bit segments, LBlock and RBlock. Using a 56 bit derivative of the 64 encryption bit key, a complex non-linear operation (•ç) is performed on RBlock.The modified RBlock is then XORED with Lblock and the resultant fed to the next RBlock register. The unmodified RBlock is fed to the next LBlock register.With another 56 bit derivitive of the 64 bit key, the same process is repeated. The sequence is performed a total of 16 times before the LBlock and RBlock segments are recombined and an inverse of the initial permutation is performed. The result is the 64-bit ciphertext block.

DES Modes Of Operation

The Federal Information Processing Standard (FIPS) defines four modes of operation for the DES that may be used in a wide variety of applications. The modes specify how data will be encrypted and decrypted.

The modes included in this standard are the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode. The following sections offer a simplistic demonstration of the operation of the various encryption modes. A more detailed description of the modes of operation can be found in FIPS Publication 81, DES Modes of Operation.

Electronic Codebook (ECB)

In ECB encryption, a plaintext data block is applied to the model featured in Figure 1. Plaintext is presented to the DES encryption engine for processing. Upon completion a ciphertext block is output. The function continues converting plaintext to ciphertext on an individual block by block basis. The ECB decryption process is the same as the ECB encryption process except that the decrypt state of the DES device is used rather than the encrypt state.

Cipher Block Chaining Mode

(CBC)

In CBC mode, the initial plaintext block is XORed with an Initialisation Vector, IV, which is derived from a double length encryption key. The result of the XOR is processed by the encryption engine and output as the ciphertext related to the input plaintext block. The XOR output is also used as the IV in the next plaintext block encryption function. As a result each ciphertext block output is directly related or chained to the previous encryption function.

Cipher Feedback Mode (CFB)

In CFB mode, the initial plaintext block is XORed with an Initialisation Vector,which is derived from a double length encryption key. The resultant XOR function is output as the first ciphertext block. The XOR result is also fed into the encryption engine and the output presented as the IV for the next plaintext block.

Output Feedback Mode (OFB)

In OFB mode, an Initialization Vector is extracted from a double length encryption key. The IV is presented to the encryption engine and the resultant encrypted cipher key is XORed with the plaintext block to produce the ciphertext block. As a second plaintext block is presented the encrypted cipher key used for the previous XOR is cycled through the encryption engine again to produce the next cipher key. As a result the initialization vector is continually processed as a stream through the encryption engine until no more plaintext blocks are presented.

Triple DES

In recent years, increased microprocessor performance has left a concern that the already high security level offered by the DES encryption algorithm may be threatened by a concerted “brute force” attack. As a result the DES3 or Triple DES standard has been ratified to provide a still higher encryption level. DES3 operates by performing three DES1 processes using a 168 bit key. Figure 5. (Triple DES)

Security Implications Of Key Ciphers

The strength of key based ciphers is the vast quantity of possible key permutations that are available to the user. However this is also the weakness.The algorithm is declared public, therefore only the integrity of the key, or more to the point the user with access to the key, is susceptible.Data can be retrieved by an unauthorized party in a number of ways; Assuming an unauthorized party has gained access to a tape cartridge which holds sensitive data there are a number of ways that the encryption can be compromised.

1. A brute force attack is possible. With enough financial and computer resource, every possible key combination can be generated and tested. But, without knowing exactly what the unencrypted data was in byte or binary terms, how will the perpetrator know when the correct cipher key has been found? Assuming the data was generated by an application with a known file structure, in theory the crack should be easier to achieve. That said the application would have to restore the data before it can be seen to be correct. The crack time has now risen from the time taken to generate and apply the keys to a few cipher blocks, to up to 2168 restore operations.

2. A hardware solution could be designed or a software program written if a portion of unencrypted data is known to be on the tape in encrypted form. A full key sequence could be generated and a comparison to the data on tape made. This would again involve multiple tape passes. To avoid incurring the penalty of multiple tape comparisons the data could be copied to disk and the test data compared, however if there was fifty gigabytes of data on the tape and this was copied and compared at disk level, there could be up to 2168 fifty gigabyte comparisons. 3. If there is access to the cipher key, the data is compromised.

Securing The Key

It is clear that if an encrypted tape becomes available to an unauthorized party, the danger to the data is minimal, unless there is an “inside” source from whom the encryption key used to generate the tape is available.

Security can be introduced on a procedural basis, however this will not protect from a malicious act other than to highlight that person’s actions after the data has entered the public arena, such as in a press disclosure.

If however the data is used in a private manor for business or financial advantage it is unlikely the rightful owner of the data will ever know that security has been compromised. DES does not have the facility to safeguard against disclosure of the encryption key; therefore it is necessary for any device that introduces encryption to overcome this problem. A system whereby both a “User Key” and a “Device Key” must be implemented is the most reliable method. In this case a key is input at each session by the user/operator and the encryption unit itself also has an internal key unique to itself. The unit accepts the user key and performs a non linear algorithm with its own key. The resultant product is a composite key that is used to encrypt the data. More to the point data can only be decrypted by a combination of the correct encryption unit combined with the correct user key.

Encryption Device
The Hardware Solution

There are many software encryption solutions on the market today, however as well as not addressing the issue raised above they are inappropriate in a modern storage environment. In an enterprise backup environment, in almost all cases data being written to tape is routed from a disk server of some description through a number of backup servers to a tape drive or silo. If a software solution is implemented it will introduce a performance overhead either at the disk or storage server level. It is a fact of the modern computing industry that due to international access requirements to data, the backup window is shrinking. Data is growing at an almost exponential level. The corporate disaster recovery capability is deemed to be of higher importance than data security.

As a result, any encryption system that bottlenecks the data coming from the servers is unlikely to be implemented. Only an external encryption device meets all of the criteria specified for effective data security in a tape storage environment. Furthermore the subsystem must be platform and data management software independent. Using an integrated encryption card is not feasible unless the on board key is either reproducible in the event of a failure of the card. If encryption is used as a means of securing data while tapes are in transit, duplicate subsystems will have to be at the source and destination sites. A further limitation of an embedded encryption card is in a heterogeneous environment where data could be produced on a system implementing S-Bus technology but may need to be read on a system implementing PCI for example.

Conclusion

When investigating how to implement a program for ensuring the security of data when held on tape it is vital that a combination of appropriate technology is operated under a strict procedural policy. It must be established how much of the corporate data is sensitive. Upon deciding what data is sensitive it must be established whether the medium on which the data is stored is portable, or is susceptible to theft from the data center. An encryption device must be selected which can be moved from platform to platform with the minimum interference to operations and which will not introduce software related problems. The device must support recognized encryption standards.

The device must have an integral key to prevent compromise of data in the event of the user key becoming public. The device must have a “standalone” facility and not be dependent upon the data path server for configuration of the user key. A device range must be selected which is flexible enough to produce unique key or common key units dependent upon the corporate data sharing requirements.

Further Reading
FIPS PUB 46-2
Data Encryption Standard (DES)
(http://www.itl.nist.gov/fipspubs/fip46-2.htm)
FIPS PUB 46-3
Data Encryption Standard (DES)
(http://csrc.nist.gov/fips/fips46-3.pdf)
FIPS PUB 81 Modes of Operation
(http://www.itl.nist.gov/fipspubs/fip81.htm)
NIST Special Publication 800-20 Modes of Operation Validation System for the Triple Data Algorithm
(http://csrc.nist.gov/nistpubs/800-20.pdf)
NIST Special Publication 800-17 Modes of Operation Validation (http://csrc.nist.gov/nistpubs/800-17.pdf)


Need help with writing Cryptography Case sample essay?

Get help


  • StudyAcer

    4.7/5
  • Trustpilot

    4.6/5
  • Sitejabber

    4.6/5

Please fill in the Order, to get Instant Homework Help


Attach files for the writers' reference