Cryptography

Submitted by: Submitted by

Views: 357

Words: 4315

Pages: 18

Category: Other Topics

Date Submitted: 11/27/2011 12:19 PM

Report This Essay

Titan Technology Inc. Cryptography

John St John

Keller School of Management

Cryptography and Security

SE577

Professor William Umiwowicz

November 18, 2011

Titan Technology Inc. Cryptography

Table of Contents

Introduction3

Cryptographic Areas3-4

Executive Summary4-5

Titan Technologies Functionality5-6

Section 1: Feasible Attacks on Titan Technologies6-7

1A. Titan Cryptographic Plan7

Section 2: Digital Encryption Standards8

2A. Digital Encryption Standards8

Section 3: Password Based Encryption8-10

Password Based Encryption requirements9

Section 4: Good Passwords10-11

Establishing Password requirements10

Section 5: Biometrics11-12

Establishing Password requirements11

Section 6: Comparing of Algorithms 12

RSA Algorithm12

Diffie – Hellman “DH” Algorithm12

Elliptic Curve Diffie – Hellman Algorithm12

Section 7: Digital Signatures12-13

Digital Signature Process13

Section 8: Digital Signatures and Authentication13-14

Mutual Authentication14

One way Authentication14

Section 9: Security Recommendations14-15

Section 10: Recommendations for Titan Technologies15

Section 11: Conclusion15

Section 12: Executive Meeting Power Point Presentation15

Section 13: References16-19

Introduction

Titan Technology is a rapidly growing industry that was established back in 2006 with two best friend’s names David Miller and John Davidson, in their garage located in in Crystal Parks, Colorado. I began working for Titan Technologies in 2008 as the Senior Director of Security for the Corporation. The office that I work for is central located in Crystal Parks of Colorado. Titan Technologies current employs 220 employees along with 100 Work Stations and 80 laptops and 6 Servers for Database Applications. Titan Technologies utilizes a software and database application called (EDRNA) or Electronic Database Repository for National Archives....