Term Paper on "Cryptography Information Systems Technology"

Term Paper 15 pages (4153 words) Sources: 10 Style: APA

[EXCERPT] . . . .

Cryptography

Information Systems technology has become an essential aspect of business and industry in recent years. As such organizations and individuals alike have formulated ways to keep information secure and private. Cryptography is vital to the development of the always growing information technology world. The purpose of this discussion is to focus on the role of cryptography in wireless networks, smart cards, content delivery services, e-commerce and health care. The discussion to follow will solidify the fact that cryptography is an enabling technology that is vital for the development of the information society including applications such as smart cards (for identification and financial transactions) content delivery services (pay-per-view audio/video) and wireless networks.

Cryptography

Cryptography is defined as "the science of designing of cipher systems, whereas cryptanalysis is the name given to the process of deducing information about plaintext from the ciphertext without being given the appropriate key. Cryptology is the collective term for both cryptography and cryptanalysis (Murphy & Piper, 2002)."

Murphy (2002) also explains that the purpose of a cipher system is to hide private or confidential information in a manner that makes it impossible to understand. There are two primary uses for a cipher system: to securely store data and to broadcast data over an insecure channel. Cipher systems do not prevent people from having access to data but it does guarantee that the individual will not have the ability to decipher the data (Murphy & Piper, 2002).

The author also posits that the
Continue scrolling to

download full paper
concealed information is referred to as the plaintext and the process of disguising the information is referred to as encryption. Additionally, the plaintext that is encrypted is known as ciphertext or cryptogram while the guidelines used to encrypt information plaintext is the encryption algorithm (Murphy & Piper, 2002). In most cases the ability of the algorithm to function is dependent upon the encryption key. The encryption key is input to the algorithm alongside the message. A decryption algorithm must be present to allow the recipient to obtain the message from the cryptogram. When the decryption algorithm is used with the proper decryption key, the plaintext from the ciphertext is duplicated. In most cases the guidelines that constitute one of these cryptographic algorithms is likely to be very complicated and they need careful design (Murphy & Piper, 2002).

In addition an individual who intercepts the message is referred to an interceptor. These individuals can also be referred to as the enemy, eavesdropper, or adversary (Murphy & Piper, 2002). Nevertheless, the proper name for such an individual is interceptor. It is also important to note that an interceptor could be a good guy. In addition, even if an interceptor understands the decryption algorithm, they usually don't know the decryption key. As such it is difficult for an interceptor to understand the plaintext (Murphy & Piper, 2002).

Now that we have gained a greater understanding of what cryptography is, let us discuss the manner in which it is utilized in applications such as wireless networks, smart cards (for identification and financial transactions) and content delivery services (pay-per-view audio/video). We will also focus on the role of cryptography in ecommerce and healthcare.

Wireless Networks

In recent years wireless networks have become a vital source of communication for businesses and home users. Wireless networks are popular because they provide individuals with greater mobility and access to information. Wireless networks are present in airports, coffee shops and many other places. Although wireless networks are extremely popular, they can also be difficult to secure. In fact, several studies have shown that wireless networks leave users open to many vulnerabilities. Cryptography has long been used to address this issue. Initially cryptography technology known as Wired Equivalent Privacy WEP was utilized. WEP offered little protection to wireless networks and there users. According to Piazza (2003)

Academicians and security experts began exposing the gaping holes in WEP not long after the standard was released in late 1999 by the Institute of Electrical and Electronics Engineers (IEEE). Ken Evans, vice president of marketing and product management at Fortress Technologies, which makes wireless security products, says that WEP's biggest flaw was what he calls a bad implementation of good cryptography "Think of a keychain with only four keys," he says, referring to WEP's rotation of only four encryption keys. "It's pretty easy for someone, once they find the right key, to open all the doors (Piazza 2003)."

Indeed, once the key is found and an individual has the time and the proper processing power, he will have access to the transmission of the data and will have the capacity to decipher information concerning the wireless network and the user including the internet protocol address (Piazza 2003). Once the internet protocol address is known the network becomes extremely vulnerable.

To combat the problems associated with WEP, Wi-Fi Protected Access (WPA) was developed and served as a temporary solution to be utilized until a better designed protocol could be developed and implemented (Piazza 2003). WPA provided a solution to the aforementioned security issues by presenting a larger number of keys in a more frequent pattern, thus ensuring that it would be more difficult for an individual to gain access to and decipher the encryption during transmission (Piazza 2003). WPA is also designed to provide tough user authentication; this authentication begins prior to encryption.

In addition WPA was a popular choice because it could be upgraded and as such users would not have to purchase new hardware to receive more advanced security options (Piazza 2003).

The author further explains that the design of the WPS was taken from the IEEE protocol known as 802.111. This protocol was essential at the time because it provided a more intense level of encryption known as that Advanced Encryption Standard (AES) (Piazza 2003). The authors explained that AES provided slightly better security but WPA actually solved the problem associated with the vulnerability of wireless networks (Piazza 2003).

As you can see, cryptography plays an important role in the securing of wireless networks. Wireless networks are a vital communications tool within the paradigm of our increasingly global world. Without the presence of cryptography information could easily end up in the hands of individuals that would do harm to businesses and individuals alike. Businesses use wireless networks to share information over significant distances. For instance, a business might use a wireless network to email sensitive information or to purchase products. If the network is not secured with the appropriate cryptography, competitors may have the ability to obtain information about the business and the competitive advantage may be lost.

The use of cryptography for wireless networks is also important as it relates to individual users. Now more than ever people are using the internet to access bank accounts, pay bills and purchase products. This means that banking information and credit card information is constantly transmitted via the internet. Cryptography is used to secure this information to ensure that it is not stolen and used by unauthorized persons. Indeed, as it relates to wireless networks, cryptography plays a vital role and acts as a necessary agent for this form of information systems technology. Although wireless networks are an extremely popular form of technology, they are not the only popular technology. The following paragraphs will discuss the role that cryptography plays as it relates to smart cards.

Smart Cards

In addition to wireless networks, smartcards have also become vitally important information systems technology. Smart cards were first developed in the mid-1970's and they are cards that contain a computer chip (Misra et al., 2004). Smart Cards are comparable to a debit or credit card however they differ in that they permit the user to store, secure, and update information at some point in a transaction. In addition, smart cards are able to store greater amount of information than a credit card and smart cards are also able to make basic decisions during a transaction (Misra et al., 2004).

There are two primary types of Smart cards memory cards and microprocessor cards, however there are also other types of smart cards. Memory cards are designed to store data, and are comparable to a small floppy disk. Microprocessor cards are composed of a central processing unit (CPU) that allow it to process data, conduct interim calculations, provide security, and store data (Misra et al., 2004). The author asserts that the information stored in a smart card is secured through well-designed encryption. Additionally a number of microprocessor cards can also perform various functions on a single card, thus improving flexibility and appeal to a user. Additionally a card reader must be present to read a smart card (Misra et al., 2004).

There are also various types of smart cards that can be utilized. One such type is the Electronic Purse. The Electronic Purse is a smart card containing an electronic counterpart to cash and is regarded as a replacement for a traditional purse (Misra et al., 2004).

Electronic purses are usually come in the form of debit cards that contain a… READ MORE

Quoted Instructions for "Cryptography Information Systems Technology" Assignment:

thesis statement.

Information security, in particular cryptography, is an enabling technology that is vital for the development of the information society including applications such as smart cards (for identification and financial transactions) content delivery services (pay-per-view audio/video) and wireless networks.

These are the directions given from the class.

15 pages, analytical, survey paper on this topic. The paper should extract the primary issues, discuss the various possible solutions to the issues raised, identify "trends," and formulate a position. You need to provide your point of view. Your paper should review the recent literature. A minimum of 10 references are required. At least three references papers must be from the last three years and do not use only web sites as references. References from Wiki*****s are no good. The paper should have the form of a short scientific paper (i.e. abstract, introduction, main body with appropriate headings, and a conclusion with a reference list) and must be prepared in the format outlined in the APA style guide.

I would like the paper to argue that cryptography is vital to the development of the always growing information technology world. Talk about its role in wireless networks, identification purposes, e-commerce, health care etc.

Please email me if there are any questions or need more info.

How to Reference "Cryptography Information Systems Technology" Term Paper in a Bibliography

Cryptography Information Systems Technology.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/cryptography/35085. Accessed 6 Jul 2024.

Cryptography Information Systems Technology (2007). Retrieved from https://www.a1-termpaper.com/topics/essay/cryptography/35085
A1-TermPaper.com. (2007). Cryptography Information Systems Technology. [online] Available at: https://www.a1-termpaper.com/topics/essay/cryptography/35085 [Accessed 6 Jul, 2024].
”Cryptography Information Systems Technology” 2007. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cryptography/35085.
”Cryptography Information Systems Technology” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cryptography/35085.
[1] ”Cryptography Information Systems Technology”, A1-TermPaper.com, 2007. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cryptography/35085. [Accessed: 6-Jul-2024].
1. Cryptography Information Systems Technology [Internet]. A1-TermPaper.com. 2007 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cryptography/35085
1. Cryptography Information Systems Technology. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cryptography/35085. Published 2007. Accessed July 6, 2024.

Related Term Papers:

Use of Geographical Information Systems in Combat Research Proposal

Paper Icon

Geographical Information Systems in Armed Warfare

Today's technology has altered the face of modern warfare. Technology has made it possible for peacekeeping to play a bigger and more successful role,… read more

Research Proposal 12 pages (3271 words) Sources: 6 Topic: Military / Army / Navy / Marines


System Security Thesis

Paper Icon

System Security

Every organization which is dependent on computer systems for its vital activities needs to have a certain degree of system security, the level depending on the nature of… read more

Thesis 9 pages (2884 words) Sources: 9 Style: APA Topic: Computers / IT / Internet


Information Technology Refuting the Claims That Windows Thesis

Paper Icon

Information Technology

Refuting the Claims That Windows-based systems are not as Secure

As Linux or Apple Mac systems

The evaluation of one operating systems' level of security relative to another… read more

Thesis 12 pages (3173 words) Sources: 8 Style: MLA Topic: Computers / IT / Internet


Addressing Wireless Networking Technology and Security a Moving Target Research Proposal

Paper Icon

Wireless Networking Technology and Security: A Moving Target

The objective of this work is to focus on wireless networking technologies, protocols, standards and operations. Additionally examined will be the capabilities… read more

Research Proposal 22 pages (7497 words) Sources: 16 Style: APA Topic: Computers / IT / Internet


Information Technology (IT) Issues in E-Business Research Paper

Paper Icon

role of information assurance on improving trust and efficiency in e-Business.

IT issues in E -Business

The field of Information technology has affected the way business is conducted across the… read more

Research Paper 16 pages (4099 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!