PROJECT #2 This will be our plan to secure our atomic number 16 company wide when utilize cell phones. cryptographical systems crazyweed provide one or more of the following iv services. It is chief(prenominal) to distinguish in the midst of these, as close to algorithms be more suited to concomitant tasks, but not to others. When analyzing our requirements and risks, we true which of these four rifles will be theatrical roled to protect our selective information. Authentication-Using a cryptological system, we can attest the indistinguishability of a perverse substance abuser (or system). A ordinary example is the SSL certificate of a web server providing certainty to the user that he or she is connected to the correct server. The identity is not of the user, but of the cryptological key of the user. Having a slight secure key lowers the dedicate we can place on the identity. Non-Repudiation-The concept of non-repudiation is particularly important for financial or e-commerce applications. Often, cryptologic tools are required to swan that a unique user has made a morsel request. It must not be possible for the user to contradict his or her actions. For example, a client may request a transfer of specie from her direct to be paid to some other account. Later, she claims never to effectuate made the request and demands the money be refunded to the account.
If we have non-repudiation done for(p) cryptography, we can prove ordinarily through digitally signing the transaction request, that the user veritable the transaction. Confidentiality-More comm only(prenominal), the biggest patronage will be to keep information private. cryptographic systems were to begin with developed to function in this capacity. Whether it be passwords direct during a log on process, or storing confidential medical exam records in a database, encoding can assure that only users who have approaching to the catch key will snuff it access to the data. Integrity-We can use cryptography to provide a means to ensure data is not viewed or change during fund or transmission. Cryptographic hashes for...If you want to get a wide of the mark essay, golf-club it on our website:
Ordercustompaper.comIf you want to get a full essay, wisit our page:
write my paper
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.