All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

The Advanced Encryption Standard (AES), Research Paper Example

Pages: 5

Words: 1483

Research Paper

Introduction

As the innovation advances, it is essential that communication remains a fixture between individuals.  (Zaidan, Zaidan, and Majeed, 2010). Looking at this current situation, there is the requirement for a protected system that keeps the transmission of data protected against unwanted intrusion.  There are numerous encryption calculations that have been produced to guarantee that the data being sent is secure from outside interruption. Most banks uses a higher level of encryption in order to protect the data that is transmitted through online transactions. The symmetric key cipher of using a higher bit key, guarantees that it is not the weakest link. Many banking institutions relies on financial cryptography in order to decrease the financial loss of online banking. Previously used, and in some institutions, is the Data Encryption Standard cryptographic mechanism. This system was used primarily to protect the transfers of electronic funds. There have been many standards placed in which ensures that data is encrypted and lives up to the standards that are outlined by regulations. This information is significant and fundamental when ensuring customer’s confidence, and helping to attract new customers to the banking institutions.

Encryption

A decent encryption system ought to have the capacity to figure out if the data source and recipient of a given bit of data is valid. According to Kamakoti, Ananth, and Karthikeyan (2005), in order to fully eliminate the threats to security, the organization needs secure communication systems with various facilities. (Kamakoti, Ananth, Karthikeyan, 2005) One of the offices, the system ought to have is data security. This is to guarantee that the system has the capacity secure all data being sent by guaranteeing that unapproved persons do not control the initially sent data. An alternate factor is to guarantee privacy of the data being transmitted. This aspect guarantees that data is not revealed to unauthorized or approved individuals. This is so in light of the fact that the sender and the receiver should be aware of the information sent. Authentication is a primary center estimation of the system in which permits the receiver to determine the correct sender of a given piece of data. Hence, any gatecrasher who tries to take on the appearance of the sender ought to be hindered by all methods.

Nonrepudiation is the capacity of the system to demonstrate that the message that was sent truly fits in with a given sender, and along these lines, the sender cannot have the capacity to deny sending a given message at a later time. Accordingly, the system actualizing the system’s security should have the capacity to focus the correct sender of a particular data. The system ought to likewise be able to secure a communication session from the cause of denial of service attacks, and external intrusions.

Experts such as Stinson places importance that to guarantee that the transmission of data is secure, there is have to change it into a structure that cannot be perused by a gatecrasher utilizing cryptography. Cryptography is defined as the art and science of securing information that the sender transmits to the receiver.  Encryption alludes to the procedure of changing over the plain coherent data into a structure that cannot be effortlessly perused by any interloper. Decryption is the procedure of changing the scrambled data into the first organization that can be examined by people. Available today, there are numerous encryption systems. This system lives up to expectations by expanding the extent of the DES keys and applying the DES encryption system. Three times in progression yet with three separate keys, making it more secure against the savage power procedures that are utilized.

On account of the manager and Alice, there is a necessity to have to figure out if Alice gift was really intended as such o the bank’s manager. Primarily, there is no proof to display if Alice had prior spoken with the manager to give a premise regarding whether Alice asked for the manager to charge her record. Besides, there is a worry concerning why Alice never exchanged the cash herself to the account of the manager. In another point, examination concerning the password and the privacy of the Personal Identification Number needs to be addressed. What’s more on the off chance that she imparted it to the manager, then a clarification ought to be provided in a similar manner. There may be a joint effort between the administrator and the client or more awful still the chief could have controlled the message to help his demonstration.

The system ought to additionally be examined for nonrepudiation so as to find out that Alice, although she denied, was the person that sent the message. If 3 DES system is implemented in the Super Secure Bank, after an attack, the first step that the bank will do is enter into an agreement with Alice, to calm the controversy, and seal the loophole. This could be possible by giving Alice a refund. At the outset, the bank will be subject for neglecting to guarantee that the stores that are saved will have secure bank accounts. This is to guarantee that alternate clients of the bank do not get into such trap. Then again, such data when put openly area will mean a more concerning issue that will demonstrate hard to oversee and can prompt putting off potential clients, as well as losing already established customers. An alternate pivotal issue that can emerge will incorporate customers who are cautious of banking with the institution, as well as having a lack of trust with potential customers.

A cryptographic system in which utilizes the cipher algorithm on a data three times blocked is the Triple Data Encryption Service (3DES). While the Advanced Encryption Standard system of encoding manages the utilization of permutation network and substitution to encrypt data.  The technology 3DES depends on the prior innovation and has a shortcoming. This shortcoming is the weakness of the system to plain content assaults that can undoubtedly beat the security of the 3DES system. Various encryption key length is used by AES on the other side; that consist of respectively 128, 192, and 256 bits. (Schaffer, Glaser, Franzon, 2004) While the DES standard defines the 56 bits, which are used by the 3DES system. The AES System uses 128 bits, whereas the 3DES system utilizes the 64 bits block length.

The utilization of the 3DES innovation has a shortcoming in that it obliges that after 32GB of data transferred the keys be changed so as to minimize any probability of a spillage happening. An extra security feature is incorporated in the AES system that permits it to try to seek out the leaked data, while it is being transmitted from the sender to the beneficiary particularly with the indistinguishable pieces. From the clarification over, compared to the 3DES system, a far more superior information security is the AES system. While AES is used in reducing attacks, it is used directly to curb brute-force attacks, and also provide a high level of complex computations in which provide a fair amount of protection to organizations.

Conclusion

In detecting the leaked data, when it comes to securing the information a better system is the AES system. (Nath, Ghosh, and Mallik, 2010). As per the instance of Alice, such as if the perceived system was implemented. It would make it easier to identify if Bob the manager, or Alice were the information source that prompted the exchange of $1,000,000.By knowing the genuine source of the content, within the communications systems it will be anything but difficult to catch any uncommon conduct. The encryption system that is set up as of now is not a decent one since it was not ready to distinguish the negligence. Making the bank defenseless against any assaults controlled to the online transactions.

A proper system ought to have possessed the capacity to have somehow of reporting any privilege or wrongdoing with respect to the cash that was exchanged from the customer’s record by a senior representative. A senior board of directions will consequently enhance the arrangements on security of all the data and data about the customers in the bank. Keeping in mind the end goal to maintain a strategic distance from situations that can be expensive to the bank. The board of directors ought to likewise give preparing to their representatives on expert moral qualities. The clients ought to be encouraged to maintain the banks’ subtle elements secret so as to dodge any undesirable access to their records. A decent security system will guarantee that any unwanted interruption is avoided the data and data.

References

Basel Committee on Banking Supervision. (n.d). Bank for International Settlements. Retrieved from http://www.bis.org/bcbs/

Kamakoti, V., Ananth, G., Karthikeyan, U.S. (2005). Cryptographic Algorithm Using a Multi-board FPGA Architecture. Nios II Embedded Processor Design Contest-Outstanding Designs. Retrieved from http://www.altera.com/literature/dc/2.1-2005_India_1st_IITChennai-web.pdf

Rouse, Margaret. (2014). The Advanced Encryption Standard (AES). Tech Target. Retrieved from http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard

Schaffer, A. Glaser, P. D. Franzon, (2004).Chip-Package Co-Implementation of a Triple

DES Processor. IEEE Transactions on Advanced Packaging, Vol. 27, (1).

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper