E195687 Applied Cryptography in The Cloud
E195687 Applied Cryptography in The Cloud
Assignment title
R.M.S.I.Rathnayaka/E195687
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Unit Title
Assignment Number 1 Assessor
03/11/2024 Date Received
Submission Date 1st submission
Date Received 2nd
Re-submission Date submission
Assessor Feedback:
LO1 Analyse encryption ciphers and algorithms as methods to secure data in a cloud
environment
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
LO2 Discuss security risks and issues related to public key encryption in practice
Pass, Merit & Distinction P3 M2 D2
Descripts
LO3 Demonstrate the use of cryptographic and cryptoanalysis tools for improving security in
a virtual private network
Pass, Merit & Distinction P4 P5 M3 M4 D3
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Summative feedback
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are
accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text
boxes in the body except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide
both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the
course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the
correct form. I further understand what it means to copy another’s work.
e195687@esoft.academy 03/11/2024
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Unit Number and Title Unit 30: Applied Cryptography in the Cloud
Unit Tutor
Assignment Title LAN Design & Implementation for Enclave Films Company
Issue Date
Submission format
The submission is in the form of an individual technical report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO2Discuss security risks and issues related to public key encryption in practice
Activity
Write a technical report on the use of cryptography for the security on the
cloud as follows.
Task 1
Compare and critically analyse the fundamental differences, advantages and
drawbacks between stream cipher and block cipher. Simple examples can be
used in explanations.Discuss the improvements that can be introduced to
ShipCargo cloud by stream cipher. Justify your answer.
Ciphers like DES and AES use bitwise XOR operations in their algorithm.
Implement an algorithm to show how a 4-bit input can be encrypted with a 4-
bit key using XOR function. Provide screenshots of the code.
Task 2
Discus how public key algorithms can be used to provide authentication and
confidentiality to ShipCargo and discuss the security vulnerabilities of
encrypting with a single key.Analyse the benefits and importance of using
encryption techniques (Eg: KEMs, DEMs, PKEs) to secure a public key system
Task 3
Illustrate with diagrams, the encryption and decryption process in PKI
environment for the cloud solution proposed for ShipCargo. Identify and
assess the security risks and challenges likely to occur when using a cloud-
hosted PKI in the company’s private network.
Design a security case for an identified threat for ShipCargo and implement
the designed case using suitable cryptography and cryptoanalysis tools.
Provide a critical review of the implemented system and how it meets the
intended security objectives of the company with any suggestions for further
improvements.
Task 4
Table of Figures
R.M.S.I.Rathnayaka | E195687 | ACCPage 17
figure 1
figure 2
figure 3
figure 4
figure 5
figure 6
figure 7
figure 8
Table of Table
Table 1___________________________________________________________________________________________________________________________________26
Table 2___________________________________________________________________________________________________________________________________41
Table 3___________________________________________________________________________________________________________________________________51
Acknowledgement I would like to express my sincere gratitude to Mr. Bevan Kanishka for his invaluable guidance and support throughout the
duration of this report. His expertise and encouragement were instrumental in the successful completion of this report. I am also thankful for
his insightful lectures on applied cryptography in the cloud, which provided a strong foundation for my study. Additionally, I would like to
thank my friends and family for their continuous support and encouragement. R.M.S.I.Rathnayaka.
ShipCargo, a freight encouraging company, has made the strategic decision to transition from its current on demesne ERP system and database
to a pall- grounded result. This move is driven by the company's desire to enhance its functional capabilities and address several crucial
challenges. By migrating to the pall, ShipCargo aims to achieve better vacuity of its systems, icing that critical business operations can be
penetrated and maintained with minimum time-out. The pall's essential adaptability will give advanced disaster recovery and data protection
capabilities, securing the company's precious information. also, this transition is anticipated to significantly reduce the complications
associated with managing on demesne structure, allowing the IT platoon to concentrate on further value added tasks. From a fiscal
perspective, the move to the pall is anticipated to optimize costs by shifting from a capital ferocious model of retaining and maintaining
Introduction
Freight forwarding companies act as intermediaries, organizing the transportation and logistics required to move goods from one place to
another. Their operations include coordinating shipments, handling customs documentation, and managing transport logistics for clients. Using
robust IT systems, freight forwarders track shipments, manage inventory, and ensure compliance with international trade regulations.
Moving ShipCargo’s system to the cloud presents several advantages. Cloud infrastructure offers scalability, availability, and reduced
infrastructure maintenance costs (Hassan, 2019). By hosting its ERP system on the cloud, ShipCargo can achieve improved performance,
Symmetric key encryption is a type of encryption where the same key is used for both encryption and decryption processes. This method
requires that the key be kept secret and shared only between the sender and the receiver. For example, if Plaintext (P) is encrypted using a Key
(K), the output is Ciphertext (C). Decrypting C with K returns the original P (Diffie & Hellman, 1976).
Stream Cipher
Stream Cipher A sluice cipher encrypts plaintext data one bit or byte at a time, exercising a crucial sluice creator to produce an apseudo-
random sequence of bits. the crucial sluice). This crucial sluice is combined with plaintext using the XOR(exclusive OR) operation. The XOR
Advantages:
Drawbacks:
Block Cipher
A block cipher processes data in fixed-size blocks (e.g., 64 or 128 bits) by applying an encryption function independently on each block.
Examples: DES (64-bit blocks) and AES (128-bit blocks).
Advantages:
Padding is required if the plaintext size doesn’t align with the block size.
Typically slower than stream ciphers in real-time encryption.
Stream ciphers may offer a performance benefit in applications requiring continuous data transmission at ShipCargo, such as real-time
transaction encryption during customer interactions. Block ciphers, on the other hand, are well-suited for securing static data, such as customer
records and billing information, where security needs are high (Stinson, 2006)
The XOR operation is often used in encryption algorithms, providing a simple, reversible encryption mechanism. Here’s a Python example using
XOR for 4-bit data encryption.
1 figure
R.M.S.I.Rathnayaka | E195687 | ACCPage 27
Explanation:
Function Definitions:
xor_encrypt(plaintext, key): Takes a 4-bit plaintext and a 4-bit key as input. It performs an XOR operation bit-by-bit and returns the
resulting ciphertext.
xor_decrypt(ciphertext, key): Calls the same xor_encrypt function to decrypt the ciphertext, since XORing again with the same key
retrieves the original plaintext.
Input Validation: The code checks whether the plaintext and key are both 4 bits long. If not, it raises a ValueError.
Bitwise XOR Operation: The function uses a list comprehension with the zip function to iterate through the bits of the plaintext and the key
simultaneously, applying the XOR operation and joining the results into a string.
Example Usage: The code demonstrates how to encrypt a 4-bit plaintext and then decrypt it back to verify the process.
Output
Strengths
Simplicity The algorithms involved in symmetric key encryption are often less complex than those used in asymmetric encryption. This
simplicity can lead to easier implementation and faster performance, making symmetric encryption a preferred choice for many applications.
Weaknesses
Key Distribution: One of the major challenges of symmetric key encryption is the secure sharing of the secret key. If the key is intercepted
during distribution, an attacker can decrypt all communications using that key. Therefore, secure key exchange protocols (like Diffie-Hellman)
or physical transfer of keys are often necessary to mitigate this risk.
Scalability: In scenarios involving multiple users, symmetric key encryption becomes less practical. For N users who need to communicate
securely, the number of unique keys required for secure communication becomes N(N−1)/2.
The quadratic growth making key management complex as the number of users increases.
Strengths
No Key Sharing Risk: The primary advantage of asymmetric encryption is the elimination of the need to share a secret key. Since only the
public key is distributed, the risk of interception during key exchange is significantly reduced. The making asymmetric encryption particularly
suitable for scenarios where secure key distribution is challenging.
Scalability: Asymmetric encryption scales more efficiently than symmetric encryption. Each user only needs one key pair (a public and a
private key), regardless of the number of users. There is advantageous in large systems, such as online services and digital communications.
Weaknesses
Slower: The computational complexity of asymmetric algorithms is higher than that of symmetric algorithms. OpErations like exponentiation
and large integer factorizations are involved, making asymmetric encryption slower and less suitable for encrypting large amounts of data
directly. For instance, RSA and ECC (Elliptic Curve Cryptography) are common asymmetric algorithms, but they are typically used for
encrypting small amounts of data, like keys or signatures.
KEY Length: To achieve a level of security comparable to symmetric encryption, asymmetric encryption requires much longer keys. FOFor
example, a commonly used RSA key might be 2048 bits long, while a symmetric key like AES typically uses a key size of 128 or 256 bits. The
increased key length in asymmetric encryption contributes to its slower performance.
File encryption: Used for encrypting files on the disk (e. g, using tools like Vera Crypt).
The Encryption in Transit is used in VPNs and secure communications protocols (e. g, TLS).
By Data encryption is commonly used for encrypting large datasets in databases.
Secure Communication: Used in protocols like HTTPS, where a secure session is established using asymmetric encryption to exchange a
symmetric key.
Digital Signatures provide integrity and authentication by allowing users to sign documents or transactions with their private key, which
anyone can verify using the corresponding public key.
Email Encryption: Tools like PGP (Pretty Good Privacy) use asymmetric encryption to secure email communications.
4 figure
The use of symmetric encryption, such as AES (Advanced Encryption Standard), is common for securing data in transit, especially in
environments like ShipCargo, where sensitive shipment data is transmitted between a cloud-based system and employees in various locations.
However, while symmetric encryption is efficient, it does present several vulnerabilities, particularly related to key distribution and
management. Here’s a deeper look into the vulnerabilities you've outlined:
Challenge of Secure Distribution: Distributing the shared secret key securely is critical. If the key is sent through insecure channels
(like email, SMS, or unencrypted networks), an attacker could intercept it. Once they have the key, they can decrypt any communication
encrypted with it.
Lack of Authentication: Without proper authentication measures, employees might not be certain they are receiving the key from a
legitimate source. This opens up possibilities for man-in-the-middle attacks, where an attacker poses as a trusted source to intercept or
alter communications.
All-or-Nothing Access: Using a single key for all employees means that if one key is compromised, all data encrypted with that key is at
risk. This can lead to a significant breach, as attackers can access not only future communications but also all past messages.
Limited User Segmentation: Since everyone uses the same key, there is no way to restrict access to sensitive information. For instance,
if one employee leaves the company or is suspected of malicious activity, revoking access can be complicated, as the same key is used
across the board.
3. No Forward Secrecy
Static Key Risk: Forward secrecy refers to the property that if a session key is compromised, it cannot be used to decrypt past
communications. With symmetric encryption, once the shared secret key is compromised, an attacker can decrypt all previous messages
that were secured with that key. This presents a critical vulnerability in scenarios where sensitive information is exchanged over time.
Mitigation Strategies
To manipulate this susceptibility, Ship Cargo could call enforcing the following strategies
• Key Management results use a secure crucial operation system that can induce, store, and distribute keys securely. This might involve
utilizing public- crucial cryptography to establish secure channels for symmetric crucial trade.
• Stoner- special Keys rather of utilizing a single key for all dispatches, the company could entrust special keys to each hand or each session.
This would insulate the data, limiting the jolt of any single key concession.
• enforcing Forward Secrecy By utilizing cryptographic protocols that give forward secretiveness( similar as Diffie- Hellman crucial
trade), Ship Cargo can insure that indeed if a key is compromised, past dispatches remain secure.
• Regular crucial Gyration Regularly changing encryption keys can limit the time window during which a compromised key can be exploited.
This should be companioned by procedures for securely ranking new keys.
• Hand Training educating workers about secure practices for handling sensitive information and feting implicit pitfalls can reduce the threat
of crucial concession.
Asymmetric encryption addresses the vulnerabilities of symmetric encryption by using public and private keys. Since each employee or
system has a unique key pair, only the private key owner can decrypt messages encrypted with their public key.
Key Benefits:
A hybrid cryptosystem combines the strengths of both symmetric and asymmetric encryption to achieve efficient and secure communication.
Application at ShipCargo:
ShipCargo could implement a hybrid cryptosystem to secure data exchange between its cloud infrastructure and users (employees, customers,
etc.). Here's how:
1. Key Exchange:
When a user connects to the ShipCargo system, the system generates a session key (symmetric key) and encrypts it with the user’s
public key using a KEM (e.g., RSA).
Data Encryption:
Once the user has the session key, it’s used to encrypt and decrypt the actual shipment data with symmetric encryption (e.g., AES), ensuring
fast encryption and decryption.
03. Task
Between servers, digital identities, linked devices, and application services, businesses use public key infrastructure (PKI) to encrypt, decode,
and authenticate data. As companies rely more on the internet for vital operations, PKI is used to create safe communications to lower risks to
data theft and safeguard intellectual property. This post will discuss how related keys made possible by public key cryptography ensure data
transmission integrity and encrypt and decrypt data. (Dubose, 2023)
R.M.S.I.Rathnayaka | E195687 | ACCPage 40
6 figure
Public Key Infrastructure (PKI) is very important in the framework of ShipCargo's cloud migration to guarantee safe data flow between
several departments of the firm. PKI encrypts and decodes data using a pair of cryptographic keys public and private such that private
information is safe at rest and during transit.
Key Generation
R.M.S.I.Rathnayaka | E195687 | ACCPage 42
The Key Generation Authority (KGA), in charge of producing both public and private keys, starts the process. Under ShipCargo's scenario, the
KGA might be an internal security team or a reputable cloud service provider.
Key distribution
The KGA hands the public key to the Sender after the key pair is produced. Any authorized sender within ShipCargo may utilize the freely
available public key for encryption of data meant for the Recipient.
Data encryption
Data Encryption is Having access to the public key, the Sender encrypts the private information with this key before forwarding it. This
guarantees that the data stays unreadable to illegal users even in case of interception during transmission.
The Recipient uses their private key to decode the encrypted material upon acquisition. The private key is kept safe and never distributed such
that only the intended receiver may decode and access the original material.
49 After that, the encrypted data travels over the network from the Sender to the Recipient. The encryption guarantees the integrity and
anonymity of the data on route
• Using PKI allows ShipCargo to guarantee that sensitive information is encrypted prior to distribution, therefore lowering the data breach risk.
• Since only the intended recipient can decode and view the data, PKI ensures that the data has not been changed in route.
• Using distinct key pairs adds even more security by helping to validate the sender's and recipient's identities.
• Using PKI enables ShipCargo to follow industry standards for data security and rules for compliance.
ShipCargo could develop a safe, dependable, and efficient data management system by including PKI encryption and decryption procedures
into its cloud migration plan, hence improving general operational resilience and lowering management complexity and costs.
Table 2
Moving Public Key Infrastructure (PKI) to a cloud environment introduces specific security risks and challenges. Some notable issues include:
1. Key Management Risks: In cloud-hosted PKI, cryptographic keys are managed by a third-party provider, raising concerns over key
access and protection. Key exposure, improper key management, and weak access controls can jeopardize security (NIST, 2013).
2. Data Privacy and Compliance: Cloud providers operate in multiple jurisdictions, leading to regulatory and compliance concerns. Legal
requirements may vary depending on the region, affecting ShipCargo's data handling and storage, particularly concerning sensitive data
and customer privacy (CSA, 2021).
3. Reliance on Vendor Security: Cloud providers may employ a shared responsibility model where certain security aspects are managed
by the provider, while others fall to the customer. This model requires trust in the provider’s security controls, which may lack the
transparency required to evaluate security standards accurately (ENISA, 2020).
4. Denial-of-Service (DoS) Attacks: Cloud systems are vulnerable to DoS attacks, which can disrupt PKI services, preventing access to
critical cryptographic functions and data verification processes (Microsoft, 2019).
5. Data Breaches and Insider Threats: Data breaches in cloud PKI could expose sensitive certificate data. Insider threats, whether from
the provider or within ShipCargo, represent another layer of risk, as unauthorized access can compromise key materials (Kumar & Singh,
2020).
Enforcing PKI for customer authentication and data integrity offers ShipCargo a robust frame to secure sensitive freight information and
enhance trust among stakeholders. By using digital instruments for authentication and digital autographs for icing document integrity,
ShipCargo can more cover its data means, grease secure deals, and ameliorate overall functional effectiveness in the pall terrain.
Application of PKI
In this setup, PKI would enable:
Client Authentication: Each user or device within ShipCargo’s network would receive a digital certificate issued by a trusted Certificate
Authority (CA). When accessing ShipCargo’s systems, the user presents the certificate, verified through the PKI infrastructure, to ensure
authenticity.
Data Integrity: PKI can facilitate secure signing of shipping documents, ensuring integrity by confirming that documents haven't been
altered during transmission.
Diagram Description
A simplified PKI flow in ShipCargo:
1. The Certificate Authority (CA) issues digital certificates to clients and devices.
2. Users and devices request access to ShipCargo’s system, presenting certificates.
3. The system validates certificates with the CA, allowing only authenticated users access.
4. Data between authenticated clients is encrypted using PKI-based encryption, ensuring privacy.
Security Case Objective: By espousing both cryptographic and cryptanalysis tools, Boat Cargo can establish a robust PKI frame that protects
sensitive data, validates individualities, and effectively manages implicit pitfalls. This complete path not only enhances screen but also builds
trust among stakeholders, easing smoother missions in the shipping and logistics region.
1. Cryptographic Tools
o OpenSSL: For generating key pairs, certificates, and digital signatures within PKI, OpenSSL is an essential tool for encryption
and certificate management (Vieira et al., 2021).
o Key Management Service (KMS): Cloud-based KMS (like AWS KMS or Azure Key Vault) can manage encryption keys
securely, controlling access to sensitive keys and ensuring regulatory compliance (Chandramouli, 2020).
o TLS/SSL Protocols: Implementing secure communication protocols like TLS protects in-transit data between ShipCargo systems
and remote clients, securing sensitive customer data during transmission.
2. Cryptanalysis Tools
o Hashcat: For testing and validating password strength within PKI environments. This tool can assess weaknesses in hashed
passwords, allowing ShipCargo to identify and address vulnerabilities (Bosworth et al., 2018).
o John the Ripper: This cryptanalysis tool can test password strength by attempting to crack passwords, providing insights into
password robustness for access controls.
8 figure
A hybrid cryptosystem combines both symmetric and asymmetric encryption methods to optimize security and performance. This approach
leverages the advantages of each method: the efficiency of symmetric encryption for large data sets and the security of asymmetric encryption
For example, in cloud-based services, the asymmetric encryption component (RSA or ECC) encrypts a symmetric AES key, which is then used
to encrypt user data. This ensures that data is securely stored and quickly accessible, as only the symmetric key decrypts it once exchanged.
Thus, even if attackers compromise the storage, data remains secure without access to the key (Menezes et al., 2018).
1. Efficient Data Encryption: Efficient data encryption is vital for protecting sensitive information in cloud environments. By employing
optimized encryption algorithms, leveraging hardware acceleration, and implementing effective key management practices, organizations
can ensure strong security while maintaining system performance. As cloud adoption continues to rise, prioritizing efficient data
encryption will be essential in safeguarding data integrity and confidentiality.
Hybrid cryptosystems are essential for meeting compliance and regulatory standards for data privacy in cloud environments. They support
robust encryption policies and ensure that data confidentiality and integrity are maintained throughout the data lifecycle in cloud storage and
communication.
Cryptography is a crucial tool for businesses aiming to secure data, authenticate users, and ensure data integrity. It addresses various business
objectives, from protecting sensitive information to enabling trusted digital transactions. Key cryptographic methods include encryption,
hashing, digital signatures, and asymmetric encryption, each contributing distinct functionalities to a secure business environment (Stallings,
2017).
By integrating these cryptographic techniques, businesses can address critical security requirements:
Confidentiality: Through encryption, data remains private, meeting privacy and regulatory demands.
In summary, cryptography strengthens security, reliability, and trust in business operations, aligning with organizational objectives for secure
data management, regulatory compliance, and customer trust.
4.3 Factors Influencing Organization’s Choice of Cloud Systems for Security Improvement
Selecting a cloud system for improving security involves a strategic analysis of the business’s specific needs, the benefits and limitations of
cloud storage options, and the organization’s security requirements. Key factors typically considered include data sensitivity, compliance
requirements, cost-efficiency, scalability, and control over data access and management (Katz & Lindell, 2014).
The shift of ShipCargo’s infrastructure from on-premises to the cloud is a strategic move aimed at enhancing availability, resiliency, and
operational efficiency while managing costs effectively. This transition brings the opportunity to reinforce security by implementing robust
cryptographic practices tailored to the cloud environment.
Stream and block ciphers play pivotal roles in data security, each with unique advantages and drawbacks. Block ciphers like AES provide high
security for data-at-rest, but stream ciphers are more advantageous for continuous data transmission, which could benefit ShipCargo’s data
transfers and real-time operations in the cloud. Leveraging stream ciphers, ShipCargo can achieve efficient, low-latency encryption for sensitive
logistics data, contributing to secure and uninterrupted communication.
Symmetric and asymmetric encryption schemes, along with hybrid cryptosystems, enhance security further by enabling both efficient data
encryption and secure key exchanges. By utilizing a hybrid cryptosystem, ShipCargo can capitalize on the speed of symmetric encryption for
data encryption and the security of asymmetric encryption for key exchange, thereby addressing the vulnerabilities of single-key encryption.
Public Key Infrastructure (PKI) and cloud-based PKI solutions offer ShipCargo the ability to manage digital certificates and authenticate
identities securely, an essential factor as data becomes more accessible in the cloud. With cloud-hosted PKI, ShipCargo gains scalable certificate
management that supports operational demands, although it requires managing inherent security risks such as third-party access and potential
breaches.
Additionally, the selection of cloud systems, whether purely cloud-based or hybrid with on-premises integration, should be strategically aligned
with security needs, compliance requirements, and cost considerations. Both storage models have distinct advantages—cloud systems offer
scalability and cost efficiency, while on-premises systems provide tighter control over data.
References
Bosworth, S., Kabay, M.E. & Whyne, E., 2018. Computer Security Handbook. Wiley. Available at: Wiley [Accessed 3 Nov. 2024].
Chandramouli, R., 2020. Security Guidance for Key Management Implementations. NIST. Available at: NIST [Accessed 3 Nov. 2024].
Cloud Security Alliance (CSA), 2021. Security Guidance for Critical Areas of Focus in Cloud Computing. CSA. Available at: CSA
[Accessed 3 Nov. 2024].
Diffie, W. & Hellman, M., 1976. New directions in cryptography. IEEE Transactions on Information Theory, 22(6), pp.644-654.
Available at: IEEE [Accessed 3 Nov. 2024].
ENISA, 2020. Security in Cloud Computing. European Union Agency for Cybersecurity. Available at: ENISA [Accessed 3 Nov. 2024].
Hassan, Q.F., 2019. Internet of Things A to Z: Technologies and Applications. Wiley. Available at: Wiley [Accessed 3 Nov. 2024].
Katz, J. & Lindell, Y., 2014. Introduction to Modern Cryptography. CRC Press. Available at: CRC Press [Accessed 3 Nov. 2024].
Kumar, R. & Singh, R., 2020. Cloud PKI: Key management issues and security solutions. Journal of Cybersecurity, 4(1), pp.45-54.
Available at: MDPI [Accessed 3 Nov. 2024].
Menezes, A.J., van Oorschot, P.C. & Vanstone, S.A., 1996. Handbook of Applied Cryptography. CRC Press. Available at: CRC Press
[Accessed 3 Nov. 2024].
LO1 :Analyse encryption ciphers and algorithms as methods to secure data in a cloud environment
P1
Analyse the functions of stream cipher and block cipher, using a
range of appropriate examples in practice.
P2
Produce code that implements mathematical ciphers and
algorithms to encrypt and decrypt data.
M1
Critically analyse the operational differences between stream
LO2 :Discuss security risks and issues related to public key encryption in practice
P3
Discuss risks and issues in security of public key encryption
schemes, using a range of appropriate examples in practice.
M2
Analyse key benefits of encryption techniques including KEMs,
DEMs and PKEs and the importance of securing public key
systems
D2
Provide justified recommendations, synthesising different
definitions of provable security, suitable for securing public key
systems.
LO3 :Demonstrate the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network