Practical Assignment No. 1: 1. Security Token/Authentication Token
Practical Assignment No. 1: 1. Security Token/Authentication Token
What is Cryptography?
Cryptography is the method of transmitting secured data and communications via few codes
so that only the destined person knows about the actual information that is transmitted. This
form of process intercepts unauthorized accessibility for the data. So, in clear the name itself
indicates that “crypt” refers to “hidden” to “writing”. Encoding of information in cryptography
follows mathematical hypotheses and few calculations described as algorithms. The encoded
data is transmitted so that it makes it difficult to find the original data. These sets of rules are
utilized in the procedures of digital signing, authentication to secure data, cryptographic key
development and to safeguard all your financial transactions.
Cryptography Tools:
This token is utilized to verify the user. A security token is supposed to be encrypted to perform
a protected exchange of information. Also, it provides complete statefulness for the HTTP
protocol. So, the server-side formulated token is utilized by a browser to go on with the state.
In general, it is the method that moves with remote authentication.
Using the security token, one can authenticate the user. It is also used to provide statefulness
to the HTTP protocol. The security token has to be encrypted to allow the secure exchange of
data. The security token that is drafted at the server-side, is used by the browser to maintain
the state.
Abhinav Arora (08) 1714110101
2. CertMgr.exe
This is the installation file as it is in .exe-extension format. CertMgr holds good for the
management of various certificates. Along with this, it even handles CRLs where those are
certificate revocation lists. The objective of cryptography in certificate development is to ensure
that the information that is exchanged between the parties is more protected and this tool
supports to add additional bits in protection.
3. JCA
This is the tool used to authorize the encryption process. This tool might be termed as Java
cryptographic libraries. These Java libraries are included with predefined activities where those
need to be imported before implementation. Although it is the Java library, it works in proportion
with other frameworks and thus supports the development of multiple applications. Being a
Java library, it works perfectly with the other frameworks of Java and also helps in application
development. The application that has the urge of cryptography uses this library to build the
application if the development has been carried out using Java.
4. Docker
Using docker one can build huge applications. The information maintained in the docker is
completely in an encrypted format. In this, cryptography has to be strictly followed to move with
encryption of data. Furthermore, both files and information are encrypted thus allowing no one
to access the things having no exact access key. Docker is also contemplated as cloud storage
allowing users to manage the information either on a dedicated or shared server.
5. SignTool.exe
The signing tool is one of the more important cryptography tools that is used by Microsoft to
sign the file. This application works as the authority that can add a signature with any of the
file. In addition to that, it also adds the time stamp with the file. The timestamp associated with
the file can be used for verifying the file. Overall, all of the features provided by this tool is to
ensure the integrity of the file. In a nutshell, it is the Microsoft based product that lets the user
sign the file and also let them add the timestamp with the file.
Here, the encrypted information has to be decrypted through keys. The normal information is
easily understood by everyone whereas the encrypted information is known only by the
destined user. This tool has two kinds of encryption techniques and those are:
Symmetric Key Cryptography
Asymmetric Key Cryptography
So, cryptography tools are mostly used in every secured activity and there are many tools
available where users can choose the one depending on their necessities.
Abhinav Arora (08) 1714110101
Conclusion
There are various approaches to secure data and cryptography is one of the strongest ones.
It allows the user to protect their data from getting exposed to the external world or to someone
who may want to leverage the data to perform malicious activity. To help in cryptography,
cryptography tools are used very often. Based on the purpose of this, we do have different
tools available and one can choose the accurate one based on the requirement.