.

Friday, March 1, 2013

Project 2

PROJECT #2

This will be our plan to secure our randomness company wide when using cell phones. Cryptographic systems sess provide one or more of the following iv services. It is important to distinguish between these, as some algorithms be more suited to particular tasks, but not to others.
When analyzing our requirements and risks, we firm which of these four functions will be used to protect our data.
Authentication-Using a cryptological system, we can establish the identity of a contrary user (or system). A typical example is the SSL certificate of a web server providing proof to the user that he or she is connected to the correct server.
The identity is not of the user, but of the cryptographic key of the user. Having a less secure key lowers the institutionalize we can place on the identity.
Non-Repudiation-The concept of non-repudiation is particularly important for financial or e-commerce applications. Often, cryptographic tools are required to confirm that a unique user has made a act request. It must not be possible for the user to contradict his or her actions.
For example, a customer may request a transfer of money from her account to be paid to some other account. Later, she claims never to establish made the request and demands the money be refunded to the account.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

If we have non-repudiation finished cryptography, we can prove usually through digitally signing the transaction request, that the user authorized the transaction.
Confidentiality-More commonly, the biggest patronage will be to keep information private. Cryptographic systems were to begin with developed to function in this capacity. Whether it be passwords sent during a log on process, or storing confidential medical records in a database, encryption can assure that only users who have approaching to the appropriate key will get access to the data.
Integrity-We can use cryptography to provide a means to ensure data is not viewed or altered during fund or transmission. Cryptographic hashes for...If you want to get a wide of the mark essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment