Symmetry Key Cryptography

docx

School

Liberty University *

*We aren’t endorsed by this school

Course

605

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by PresidentFire53

Report
Running head: ARTICLE REVIEW 1 Article Review: Symmetric Key Cryptography Loaze-Noha Ngassaki Ikounga Ongania Liberty University CSCI 605 January 28, 2024
Running head: ARTICLE REVIEW 2 Symmetric Key Cryptography Overview The evolution of technology within the world of cybersecurity has grown to the point where security is now the biggest issue for everything that interacts with the IoT. The role that cryptography plays in the current data-driven world cannot be underestimated. Cryptography adds security to everyday data-handling methods out there such as ensuring secure communication between two parties, safeguarding sensitive information, protecting access to data for misuse or manipulation from unauthorized parties as well as many other things. Discussing some new advancements made to the field of cryptography helps to understand how these new bright innovations enhance the security of data. This as a whole contributes to the more broaden vision of digital security, something that has become harder with the rise of new methods of information compromise. Cryptography is present in many areas of our personal lives as well. It represents the guardianship of our digital identities, financial transaction, individual communications, and confidential data. Our dependence on secure advanced cooperations requires a continuous investigation of cryptographic methods that can endure the tireless assault of developing dangers. As we set out on this examination venture, we perceive that the actual substance of our advanced development depends on the vigor of our cryptographic guards. This article survey paper fills in as a signal directing us through the unpredictable scene of symmetric key cryptography, uncovering its most recent progressions and the significant effect they have on information security. With a steadfast obligation to understanding the complexities of this vital field, we try to add to the continuous journey for secure and secret computerized
Running head: ARTICLE REVIEW 3 correspondence in reality as we know it where information is both the cash and the fortune within recent memory. References Beattie, & Shandrowski, M. (2021). Cyber-compromised data recovery : The more likely disaster recovery use case. Journal of Business Continuity & Emergency Planning., 15(2), 114– 126. Cattanach, R. E., & Greenberg, J. M. (2022). Critical Update Needed! Addressing Cybersecurity Challenges of Public Records in the Digital Age. The Urban Lawyer , 51 (3), 427+. https://link.gale.com/apps/doc/A724902525/LT? u=vic_liberty&sid=summon&xid=2e793c5f Neish, A., Walter, T., & Enge, P. (2019). Quantum‐resistant authentication algorithms for satellite‐based augmentation systems. Navigation (Washington), 66 (1), 199-209. https://doi.org/10.1002/navi.287 Nyangaresi, V. O., Ahmad, M., Alkhayyat, A., & Feng, W. (2022). Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled internet of things. Expert Systems, 39 (10), n/a. https://doi.org/10.1111/exsy.13126 O'Melia, S., & Elbirt, A. J. (2010). Enhancing the performance of symmetric-key cryptography via instruction set extensions. IEEE Transactions on very Large Scale Integration (VLSI) Systems, 18 (11), 1505-1518. https://doi.org/10.1109/TVLSI.2009.2025171 WEBER, K. (2022, March 1). Cybersecurity and ethical, social, and political considerations: When cybersecurity for all is not on the table – doaj . Humanities and Social Sciences. https://doaj.org/article/2e7a4bf21e734b6984ce93cdcd75a51c
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Running head: ARTICLE REVIEW 4 Wu, B., Wang, C., & Yao, H. (2020). Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based internet of things. PloS One, 15 (4), e0230722-e0230722. https://doi.org/10.1371/journal.pone.0230722 New International Version. (2011). Holy Bible: N.I.V. New international version. Research Questions How do recent advancements in symmetric key cryptography actually enhance data protection? How do recent advancements in symmetric key cryptography align with other emerging technologies such as blockchain and quantum computing in regard to enhancing data protection? What are challenges, limitations, and vulnerabilities that still exist in symmetric key cryptography? What are practical applications of these advancements in real-world scenarios and how do they impact other industries that are related such as healthcare, finance, etc? Introduction Cryptography plays a crucial role in ensuring secure communication in today's digital world, where information exchange and data protection are of the utmost importance. Among different cryptographic methods, symmetric key cryptography remains as a foundation. This paper investigates the most recent progressions in symmetric key calculations and their significant effect on upgrading information assurance in the area of cryptography. By resolving questions like the new improvements in symmetric key cryptography, their suggestions on security, the potential difficulties that actually exist, this examination expects to reveal insight
Running head: ARTICLE REVIEW 5 into the advancing scene of symmetric key cryptography and its significance in protecting delicate data in the computerized age. While there are different cryptographic strategies and approaches, symmetric key cryptography, frequently alluded to as "secret key cryptography," involves a focal position. In symmetric key cryptography, a similar mystery key is utilized for both encryption and decoding. Symmetric key algorithms are essential for data security, particularly for tasks like encrypting network traffic, protecting sensitive communications, and protecting stored data. This review will start by investigating the most recent progressions in symmetric key cryptography. It is vital to stay current with these turns of events, as cryptography is a constantly developing field in light of arising dangers and mechanical progressions. We will explore how these progressions are being utilized to upgrade information security in the domain of cryptography. In addition, given that no system is immune to the ever-changing landscape of cybersecurity, we will critically evaluate any challenges and vulnerabilities that may still exist in symmetric key cryptography.