Software security



Download 121,59 Kb.
bet5/5
Sana12.07.2022
Hajmi121,59 Kb.
#782939
1   2   3   4   5
Bog'liq
softwaresec

Rainbow Tables Attacks: A precomputed table for reversing cryptographic hash functions, usually for cracking passwords.

  • Dictionary Attacks: Attempting to find original plain text by hashing common passwords and comparing them to the target value.

    But we can eliminate these attacks by using Salt and Pepper with the hashing functions. They are a fixed amount of random characters added to the password at random positions before hashing. The main difference between Salt and Pepper is that Salt is stored with the respective hash password in the database, but Pepper is not stored with the respective hash passwords in the database.
    So the modern cryptography concern mainly with the following objectives;

    1. Confidentiality: The information cannot be understood by any person whom the information was unintended.

    2. Integrity: Alteration to the data in storage or transit between sender and receiver can not be changed without the alteration being detected.

    3. Non-Repudiation: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information.

    4. Authentication: the sender and receiver can confirm each other’s identity and the origin/destination of the information.

    Therefore, Symmetric Key Encryption helps us to achieve confidentiality. Asymmetric Key Encryption helps us to achieve authentication, confidentiality, and Non-repudiation, and Hashing helps us to achieve Integrity

    Conclusion


    In this assignment ,I have learnt and showed the ways in which how information and application is secured from attacks and bad guys by the help of cryptography. Cryptography is everywhere , it is helping us to make purchases and money transactions online without any risk , along with this we are sharing private messages with our families and friends by the help of this tool and apparently digital money like bitcoin and others are based on cryptography. Therefore , I believe that it is incredibly important for making new programs.
    References

    • https://www.youtube.com/user/Computerphile;

    • https://medium.com/geekculture/encryption-hashing-and-secure-software-development-83225df5f959

    • https://techbeacon.com/security/software-engineers-guide-encryption-how-not-fail

    Download 121,59 Kb.

    Do'stlaringiz bilan baham:
  • 1   2   3   4   5




    Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
    ma'muriyatiga murojaat qiling

    kiriting | ro'yxatdan o'tish
        Bosh sahifa
    юртда тантана
    Боғда битган
    Бугун юртда
    Эшитганлар жилманглар
    Эшитмадим деманглар
    битган бодомлар
    Yangiariq tumani
    qitish marakazi
    Raqamli texnologiyalar
    ilishida muhokamadan
    tasdiqqa tavsiya
    tavsiya etilgan
    iqtisodiyot kafedrasi
    steiermarkischen landesregierung
    asarlaringizni yuboring
    o'zingizning asarlaringizni
    Iltimos faqat
    faqat o'zingizning
    steierm rkischen
    landesregierung fachabteilung
    rkischen landesregierung
    hamshira loyihasi
    loyihasi mavsum
    faolyatining oqibatlari
    asosiy adabiyotlar
    fakulteti ahborot
    ahborot havfsizligi
    havfsizligi kafedrasi
    fanidan bo’yicha
    fakulteti iqtisodiyot
    boshqaruv fakulteti
    chiqarishda boshqaruv
    ishlab chiqarishda
    iqtisodiyot fakultet
    multiservis tarmoqlari
    fanidan asosiy
    Uzbek fanidan
    mavzulari potok
    asosidagi multiservis
    'aliyyil a'ziym
    billahil 'aliyyil
    illaa billahil
    quvvata illaa
    falah' deganida
    Kompyuter savodxonligi
    bo’yicha mustaqil
    'alal falah'
    Hayya 'alal
    'alas soloh
    Hayya 'alas
    mavsum boyicha


    yuklab olish