Characteristics Of Cryptographic Primitives

Improved Essays
Cryptographic primitives are basic algorithms that used to create a protocol in the computer. The algorithm is the basic part of designing a encrypting systems. The security level of a computer system depends on the reliable level of the cryptographic primitives. Here is a detailed graphic on what is included and the types of cryptographic primitives in the CNG.

Figure 6.1 CNG cryptographic primitives
Among all the types of cryptographic primitives, one-way hashing function and encryption function are most commonly used in our daily life. One-way hashing function is used to identify data and encryption function is used to encrypt data. Hence, to explore the bottlenecks and future development of cryptographic primitives, we can focus on the characteristics of these two types.

5.1 One-way Hashing Function
As the meaning in the surface, once the value of one-way hashing function is generated, you can not get the origin meaning of the value. It is usually used to identify a file’s integrity or the source of a software instead of check the value of the data. However, the limited function can cause troubles in the more complex society. The public needs comprehensive functional tools to help them deal with the daily life. For example, when a user is going to store a password when logging into a system, whether to use the method of hashing
…show more content…
On one hand, the cryptographic primitives need to improve the algorithms to meet the complex requirement of information storage. On the other hand, the cryptographic primitives need to make detailed instructions about its reasonable use. Only these two both develop in a good direction can cryptographic primitives bring the public security in the daily

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 1 Essay

    • 639 Words
    • 3 Pages

    Append m to the bit block and thereafter apply H to have the output results. B With such an arrangement of HMAC as that shown in figure 21.4, the attacker is able to compute an output of compression function even if the IV is unknown, random or secrete to the attacker. 21.6 To perform encryption and decryption using RSA algorithm: 1. Select two prime numbers: p and q 2.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    The information security program can use tools to track any changes to any important data, also it can show when the file was last…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The NSA was established on November 4, 1952 by order of President Harry Truman. After the important work in breaking German and Japanese code during WWII, the decision was made to create the agency. The work in WWII helped the Allies succeed against the German U-boat threat and led to a victory at the Battle of Midway. After the hard work in the war, Truman decided to establish the NSA after several studies were conducted on how to best continue code breaking work post-war era. The National Security Agency was set in place of the Armed Forces Security Agency and was given the same resources.…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The time of modern technology, where we live today, brings us daily changes. Smartphones, tablets, high definition televisions, personal computers, and many other devices help us to manage our time better and increase our productivity. Health field is one of the rapidly growing field when it comes about technology. With so many computer programs specially designed for health field, liability of medical stuff and physicians takes less effort now to complete patient’s records with high percentage of quality, accuracy, accessibility, and consistency. Transition from manual medical record to electronic medical record is a processes that will improve security and flexibility of managing patient’s information.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    In creating these programs, the NIJ uses a comprehensive process to make valid technology programs for the criminal justice system. This process uses the research, development, testing, and evaluation approach to “ensure that the NIJ’s research portfolios are aligned to the best technology needs of the criminal justice community,” (Justice, 2009). For example, the NIJ formed a working group to study some of the disadvantages of the praised specialized database, the AFIS. The Automated Fingerprint Identification System (AFIS) is a specialized database that is designed to match known and unknown fingerprints with intentions on connecting a suspect to a pending crime or to an unsolved crime. The Integrated AFIS has a hierarchical structure that is perpetuated throughout the United States.…

    • 992 Words
    • 4 Pages
    Superior Essays