Please answer this question in through detail for a cyber se
Please answer this question in through detail for a cyber security class: do not leave out anything. Answer in very specific detail!!!!!!!!!!!!!!!!!!!!! Cryptography: What are challenges and solutions for businesses in the use of cryptography for data storage and communications? What about law enforcement? Will biometrics involve encryption? How are biometric technologies dependent on the use of cryptography? What is the future of PKI? Acceptance of PKI solutions has been low. What would a “killer app” for PKI acceptance look like?
Solution
Law enforcement:
Law enforcement is associatey system by that some members of society act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or grueling those that violate the foundations and norms governing that society.[1] though the term might embrace entities like courts and prisons, it\'s most often applied to those that directly interact in patrols or police work to counsel and find out criminal activity, and people United Nations agency investigate crimes and apprehend offenders,[2] a task usually administrated by the police or another enforcement agency. what is more, though enforcement is also most involved with the bar and penalty of crimes, organizations exist to discourage a good form of non-criminal violations of rules and norms, accomplished through the imposition of less severe consequences.
biometric technologies keen about the utilization of cryptography:
The security of a cryptographical system depends comparatively on the secrecy of the cryptographical key and not inflicting inconvenience once it falls within the hand of the enemy. Therefore, the key issue in cryptography is essential management (Dong et al, 2008).
Biometrics will be wont to defend the key in cryptography, whereas cryptography and information concealing will be wont to defend biometric templates ().
Combining biometry and cryptography along can have the potential to supply higher assurance of the legal info holder. Key management is a vital issue in cryptographical systems.
There square measure many ways that to mix biometry with a cryptosystem, namely:
Biometrics key unleash
Biometrics key generation
Biometrics key binding
Future of PKI:
Looking back to the first days of public-key technology, the inherent simplicity of the foremost fashionable schemes was a priority to several. however might we tend to place our religion within the semipermanent security of such easy mathematical operations?
While chinks are discovered in a number of the gildings close the fundamental schemes, the technology itself has withstood shut scrutiny by multitudinous specialists over the past forty years. In some ways, our confidence within the effectiveness of PKI is stronger than ever – and it remains the foremost sensible and cost-efficient resolution to our ever-growing security challenges.
Single Killer App for PKI
Talk about Public Key Infrastructure (PKI), the technology behind digital certificates, and opinions begin flying. whereas there are variety of productive implementations over the past 5 years, several evaluators still see PKI as a technology poised at the starting stalls. like most analysis papers on the topic, this one covers the well-known security functions enabled by PKI. a lot of attention, however, is concentrated on businessand technology problems related to PKI implementations
