Top-Rated Free Essay
Preview

Cryptography and Digital Signatures

Satisfactory Essays
426 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography and Digital Signatures
Cryptool CrypTool is an open source tool that illustrates cryptographic and cryptanalytic concepts. CrypTool implements more than 200 algorithms. In CrypTool, users are able to adjust the parameters to their own specific needs. Cryptool introduces the user to the field of cryptography. Classical ciphers alongside with asymmetric cryptography, to include RSA, elliptic curve cryptography, digital signatures, homomorphic encryption, and Diffie-Hellman key exchange.
CrypTool also contains some didactical games, and an animated tutorial about primes and elementary number theory (Cryptool, 2013). The development of CrypTool was started back in 1998, by a group of German companies and universities, but now is an open source project. More than sixty people worldwide contribute regularly to the project. The goal of the CrypTool is to help ensure users are aware of how cryptography can help against network security threats and also explains the underlying concepts of cryptology. The software is available in English, German, Polish, Spanish, and Serbian (Wikia.com, 2013). Currently under NIST there are three approved algorithms that can be used when generating and verifying digital signatures. These three algorithms are DSA, RSA, and ECDSA, which are used in conjunction with an approved Hash Function. The hash functions in Cryptool that are approved for use by NIST for digital signatures are MD5, SHA-1, and SHA-256. And the digital signature found in Cryptool 2.0 is RSA (NIST, 2013). NIST standards for RSA digital signature key sizes are 1024, 2048, and 3072 bits. Government agencies must generate digital signatures using at least one of these three choices. The security strength associated with the RSA digital signature process is no greater than the minimum of the security strength associated with the bit length of the modulus and the security strength of the hash function that is employed (NIST, 2009 p. 22). Toshiba Satellite C855D-S5340 (laptop) specifications are AMD Dual-Core E1-1200 Accelerated Processor, Windows 8, AMD Radeon™ HD 7310, 4GB DDR3 1600 MHz memory, and 320GB HDD (5400rpm, Serial ATA). After running my test several times for key generation, signature generation, and signature verification, my average time for all is .0160071 seconds.

References:
CrypTool, (2013). CrypTool Portal. Retrieved August 22, 2013 from http://www.cryptool.org/en/
NIST, (2013). Secure Hashing. Retrieved August 22, 2013 from http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html
NIST, (2009). Federal Information Processing Standards Publication 186-3. Retrieved August 22, 2013 from http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
Wikia.com, (2013). CrypTool. Retrieved August 22, 2013 from http://cryptography.wikia.com/wiki/CrypTool

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Module 10

    • 861 Words
    • 2 Pages

    Stamped signatures always come out the same because they are stamped. They stile they are written in never change. What does change is how hard the ink is pressed on the pad and on the paper.…

    • 861 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Dent, A. W., & Mitchell, C. J. (2004). User 's Guide to Cryptography and Standards. Boston, MA: Artech House.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays