Top-Rated Free Essay
Preview

Itm 431 Module 2 Is Using an Encryption System Like Pgp a Good Idea for Individuals and Organizations? and Why?

Better Essays
1325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 431 Module 2 Is Using an Encryption System Like Pgp a Good Idea for Individuals and Organizations? and Why?
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. When Julius Caesar sent messages to his generals, he didn 't trust his messengers. Subsequently, he devised a method of disguising his messages so only the intended recipient could decipher it. Only someone who knew Caesar’s "shift" rule could decipher his messages (Network Associates, Inc., 1990-1999). The Caesar cipher is one of the earliest known and simplest forms of cryptography. It is a type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on (Lyons, 2009 - 2012). Caesar’s encryption method would be known as symmetric cryptography today.
Cryptography is considered not only a part of the branch of mathematics, but also a branch of computer science. There are two forms of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems involve the use of a single key known as the secret key to encrypt and decrypt data or messages. When a message is sent, the user encrypts the message with a key which is known only to the intended recipient. The receiver will then use the known key to decrypt the message back into plaintext. The problem that symmetric cryptosystems have always faced is the lack of a secure means for the sharing of the secret key by the individuals who wish to secure their data or communications (Calloway, 2012). Additionally, the amount of keys needed for a large corporation could range into the millions, making symmetric encryption a poor choice. For example, if John, Jan, Bob, Bill, Margery, Maud, Wayne, Amber, Shane, and Phil all work together, they all need copies of each others’ encryption keys. Mathematically speaking, each individual would need 45 keys to be able to decrypt messages from all coworkers. Additionally, secret-key provides only limited key possibilities. In other words, a hacker could eventually gain access to said encrypted message/attachment through trial and error because there are only so many combination options, mathematically.
Asymmetric cryptosystems, on the other hand, use one key (the public key) to encrypt messages or data, and a second key (the secret key) to decipher or decrypt those messages or data. For this reason, asymmetric cryptosystems are also known as Public Key Infrastructure (PKI) cryptosystems. PKI eliminates the “too many keys on the ring,” and weak security issues. However, asymmetric cryptography is not without its own set of pitfalls; the main one being reduced performance speed. PKI can take from 100 – 1000 times longer than a typical symmetric cryptosystem would. For this reason, the asymmetric encryption method is not the ideal choice for businesses or individuals. In monetary terms, time is money.
A very popular public key cryptosystem is known as Pretty Good Privacy (PGP), developed by Phil Zimmerman beginning in early 1991 (Levy, 2001). PGP is a hybrid cryptosystem which utilizes the advantages of symmetric and asymmetric encryption methods while downplaying the disadvantages of both. Zimmerman realized the strength of keys needed to be impenetrable; a weak key will lend greater ease to hackers. Basically, the strength of the keys that are created to encrypt and decrypt data or communications is a function of the length of those keys. Typically the longer the key, the stronger that key is. For example, a 56-bit key (consisting of 56 bits of data) would not be as strong as a 128-bit key. And, consequently, a 128-bit key would not be as strong as a 256- or 1024-bit key. When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression, among other things, strengthens cryptographic security because it reduces the patterns found in languages. PGP then creates a session key; this key is a random number generated from the movements of the user’s mouse and the keystrokes typed. Then the random number is run through a symmetric encryption algorithm such as Triple DES, Twofish, CAST, or AES (Rijndael), which generates a one-time-only, secret key. If there is not enough information gathered a window will pop up asking the user to move the mouse and type on the keyboard until sufficient random data have been gathered. The session key works with a very secure, fast, conventional (symmetric) encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient’s public key, using asymmetric encryption such as Diffie-Hellman or RSA. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.
While PGP is virtually perfect, it does have one proven flaw; inconvenience is probably a better way to describe it. Earlier versions of PGP did not allow individuals without decryption capabilities to read messages or attachments which is the fundamental point. However, what PGP did not take into consideration was maybe the intended recipients did not have PGP. Since the recipients had no key, they were unable to decipher the excryption. Since the discovery of this so-called flaw, self-decrypting archive (SDA) was created.
SDA allows individuals without PGP to decrypt an encrypted message or attachment upon opening them. The only real cons to PGP, for both individuals and businesses, is it is a rather complex system to use and it is expensive. PGP was not designed to be easy; if it was, it would not be the most secure cryptography method in existence. Alleviating the issue is simple: provide the necessary training for all users. In the way of cost, Symantec Corp. has a pseudo-monopoly. In July 2010, Phil Zimmerman sold PGP to Semantic for the impressive sum of $300M. Astonishingly, the cost of a one year license is hefty; $239.00. This would get you entire disk encryption for all files on your hard drive, and encryption for messages and attachment. On a personal not, I was concerned to learn of the sale regarding back door keys. It’s no secret that Zimmerman went through three years of litigation and barrages from the U.S. government because of exportation laws. However when the Feds couldn’t win that one, they argued that the government should have a back door key for legal purposes, but that it would only be used in warranted cases (Perkins, 1996). To my relief, a Symantec engineer assured me there was, and will never be, a loop hole in the program for anyone, under any circumstances. Arguably, the pros of PGP far outweigh the cons. Moreover, I’m not real sure “con” is the correct term. I think inconvenience is better suited to describe difficulties faced when using PGP. While individuals can get by just fine with symmetric encryption, PGP is clearly a superior alternative. Businesses, on the other hand, would lose efficiency if any other encryption method was chosen, not to mention the security risks a business would face when using an inferior product. Conclusively, Pretty Good Privacy is the best cryptography product available for both individuals and businesses alike.

References
Calloway, D. (2012). Introduction to Cryptography and its role in Network Security Principles and Practice. Retrieved from The Chronichler 's Web Log: http://dancalloway.com/wordpress/2009/08/introduction-to-cryptography-and-its-role-in-network-security-principles-and-practice/
Levy, S. (2001). Crypto: How the Code Rebels Beat the Government. New York: Viking Penguin Publishing.
Lyons, J. (2009 - 2012). Caesar Cipher. Retrieved 12 6, 2012, from Practical Cryptography: http://practicalcryptography.com/ciphers/caesar-cipher/
Network Associates, Inc. (1990-1999). Introduction to Cryptography. Retrieved from The International PGP Home Page: ftp://ftp.pgpi.org/pub/pgp/6.5/docs/english/IntroToCrypto.pdf
Perkins, K. (1996). Why Use Pretty Good Privacy? Retrieved from Heureka: http://www.heureka.clara.net/sunrise/pgpwhy.htm

References: Calloway, D. (2012). Introduction to Cryptography and its role in Network Security Principles and Practice. Retrieved from The Chronichler 's Web Log: http://dancalloway.com/wordpress/2009/08/introduction-to-cryptography-and-its-role-in-network-security-principles-and-practice/ Levy, S. (2001). Crypto: How the Code Rebels Beat the Government. New York: Viking Penguin Publishing. Lyons, J. (2009 - 2012). Caesar Cipher. Retrieved 12 6, 2012, from Practical Cryptography: http://practicalcryptography.com/ciphers/caesar-cipher/ Network Associates, Inc. (1990-1999). Introduction to Cryptography. Retrieved from The International PGP Home Page: ftp://ftp.pgpi.org/pub/pgp/6.5/docs/english/IntroToCrypto.pdf Perkins, K. (1996). Why Use Pretty Good Privacy? Retrieved from Heureka: http://www.heureka.clara.net/sunrise/pgpwhy.htm

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Pyle, N. (2009, September 01). Designing and implementing a pki: Part i design and planning. Retrieved from…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    Weise, Joel. Sun Microsystems (August 2001) Public Key Infrastructure Overview. Retrieved May 28, 2007 from: www.sun.com/blueprints…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Encription

    • 1636 Words
    • 7 Pages

    Encryption is a mechanism by which a message is transformed so that only the sender and…

    • 1636 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    In a world where identity theft is on the rise, hackers are hard at work trying to get people’s credit card numbers, and where companies are getting your information to sell you unwanted things, tight security has become a large factor of keeping the personal and confidential information of our society safe. Cryptology and Cipher codes are commonly used ways to keep confidential information protected by preventing people not in on the secret from understanding what is being transmitted. Cryptology is the science of secure communication which is also the encoding and decoding of data. Cipher codes are more complicated because it is a method used to transform a message into an obscure form. The use of these secured messages has been dated back to the first societies of the world where they were used for many of the same reasons they are today. The first use of written cryptology was believed to take place at about 1900 B.C when an Egyptian scribe first used a non-standard form of hieroglyphics in his writing. Then in 1500 B.C in Mesopotamia (common day Iraq), an enciphered message in cuneiform was used to conceal a formula to make glazes for pottery. In the years 500 through 600 B.C, Hebrew scribes used a reverse alphabet simple substitution cipher to write the book of Jeremiah which was known as ATBASH. The Greeks used a device called a scytale (rhymes with Italy) in 487 B.C which consisted of a strip of leather that was wrapped and then written on then used as a belt which the recipient would be wearing as well and that would decode the message. The famous Julius Caesar used cryptology to keep government communications private throughout 50 to 60 B.C. Even the first president of the United States George Washington used encoded messages to send to his fellow soldiers. Therefore, cryptology and cipher codes have played large roles in the confidentiality of societies in the past…

    • 1725 Words
    • 7 Pages
    Better Essays