McCurley-Shimer_ResearchPaper

docx

School

American Military University *

*We aren’t endorsed by this school

Course

452

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by DeanHippopotamus5891

Report
Research Paper 1 Research Paper Alexus McCurley-Shimer American Military University ISSC452 Cybersecurity Professor Booth December 29, 2023
Research Paper 2 Data encryption has become a vital thing for a company to keep documents and information secure. In this paper we will be going over what encryption is as well as the threats that can occur to encryption. Also, how to combat those threats to encryption. “Encryption in cyber security is the conversion of data from a readable format into an encoded format.” (Kaspersky 2023, June 9) Encryption is a basic building block for data security. As data security encryption has become the main source used for individuals and larger corporations to be able to protect user information sent between a server and browser. Encryption involves converting readable plaintext into incomprehensible text also known as ciphertext. Which means that the readable data is changed so it will look random. “There are two types of encryption algorithms: symmetric (also called shared key algorithm) and asymmetric (also known as public key algorithm).” (Cisco. 2023, January 25) Symmetric encryption has the ability to use the same key for encryption and decryption. This is due to the fact that symmetric encryption can be more cost effective providing the security it does. Which also means that an individual or company should invest in a more securely storing data when they are utilizing symmetric encryption. Then there is Asymmetric encryption which uses two separate keys one is a public key and the other is a private key. The public key is used to be able to encrypt the data while the private key is needed to decrypt the data. The private key is given to a user with authorized access. This results with the asymmetric encryption being affecting but it is also a costly type of encryption. Encryption is not a relatively new thing it has been around for a very long time. Starting in Circa 600 BC when the ancient Spartans used what is called a scytale device to be able to send secret messages during battle. Then comes the Roman era of encryption starting at Circa 60 BC when Julius Ceasar invents the cypher that is shifting characters by three places in the alphabet.
Research Paper 3 Following that in 1553 Giovan Battista Bellaso has a vision for the first cypher to use a proper encryption key. In 1854 Charles Wheatstone has invented the Playfair Cipher which uses an encrypts pair of letters rather than a single letter which makes the cipher difficult to crack. In the Hebern rotor machine starting in 1917 when Edward Hebern invents the electro mechanical machine to be able to use a key embedded in the rotating disk. Then in 1918 Arthur Scherbius invests the enigma machine for commercial use. In World War Two there was cryptography starting in 1932 when a polish cryptographer named Marian Rejewski discovers how the Enigma works. In 1945 Claude E. Shannon of the Bell Labs now publishes an article that is a theory of the mathematical component of cryptography. This leads us to the modern cryptography which is computer-based encryption. Starting in 1970 IBM has now formed a crypto group which is designed to use a block cypher to be able to protect the customers data. In 1973 the adoption of the national standard called Data Encryption Standard or DES was conducted in the US. Which this remained to be in use until it was cracked in 1997. Then in 1976 Whitfield Diffie and Martin Hellman publishes a research paper which defines the Diffie-Hellman key exchange. Following that in 2000 when Advanced Encryption Standard or AES replaces DES. Then in 2005 the Elliptic-curve cryptography (ECC) which is an advanced public-key for cryptography scheme which allows for shorter encryption keys. There are about five different threats to encryption which are quantum computing, key security, blockchain and monetary security, law enforcement pushback, and the human factor. Quantum computing has become a technological marvel which promises to revolutionize the digital landscape. Yet there is a significant threat to encryption. Quantum computers are able to perform complex calculations at speeds that a traditional computer is unable to do. Key Security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Research Paper 4 which relies heavily on encryption keys that is essentially the digital keys to locked doors. Should the keys fall into the wrong hands the system will become vulnerable. As well as the weak key management practices and insufficient protection of the encryption keys which poses a threat to security of encrypted data. Blockchain and Monetary Security is another threat to encryption. Blockchain technology has become famous for powering the cryptocurrencies such as Bitcoin and is often viewed for the security features. Though there is a level of trust there are also many challenges. Such as the transparency of blockchain which can potentially expose transactions in detail and the data that is associated with it. This poses a threat to monetary security. Law enforcement pushback is another threat in which there is tension between the privacy and the national security, this is a never-ending battel and the encryption is caught in the crossfire. Finally, the human factor which is many different threats. Such as weak passwords, social engineering attacks, and accidental data exposure. “Encryption is under threat around the world.” (Internet Society. 2022, July 14) There are many different things that can be done to ensure that the encryption is secure. Use an end-to-end encrypted messaging apps such as WhatsApp, Telegram, and more. Another is to be able to turn on encryption on the devices or services, utilize strong passwords. Ensure that the updates are conducted, use a two-factor login system, and have the erase-data options turned on. These are just a few of the ways to ensure that encryption stays secure. “Organization have three critical tools at their disposal to ensure strong cybersecurity: encryption, authentication, and authorization.” (Genetec. n.d.) Encryption has become a very important tool for cyber security. Which ensures that threats are slowed down. This is important
Research Paper 5 because there has been an increased threat in cyberattacks and the level of sophistication of these threats has been increased. As we have gone over in this paper there is a large reason why encryption is important. As well as what threats can occur to encryption and how to combat those threats. Encryption is a vital tool to keeping documents private as intended.
Research Paper 6 References: 5 biggest threats to encryption . OpsMatters. (2023, October 31). https://opsmatters.com/posts/5- biggest-threats-encryption#:~:text=Weak%20passwords%2C%20social%20engineering %20attacks,no%20technology%20can%20fully%20mitigate. A brief history of encryption (and cryptography) . Thales Group. (2023, February 1). https://www.thalesgroup.com/en/markets/digital-identity-and-security/magazine/brief- history-encryption Cisco. (2023, January 25). What is encryption? explanation and types . Cisco. https://www.cisco.com/c/en/us/products/security/encryption-explained.html#~encryption- algorithms Protect encryption, protect yourself . Internet Society. (2022, July 14). https://www.internetsociety.org/issues/encryption/protect-encryption-protect-yourself/ #:~:text=Use%20strong%20passwords.,they%20can%20access%20your%20data. What is Data Encryption? . usa.kaspersky.com. (2023, June 9). https://usa.kaspersky.com/resource-center/definitions/encryption What is encryption and how important is it? - GENETEC . What is encryption and how important is it? (n.d.). https://www.genetec.com/blog/cybersecurity/what-is-encryption-and-how- important-is-it
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help