Submitted by: Submitted by okijohn11
Views: 357
Words: 4315
Pages: 18
Category: Other Topics
Date Submitted: 11/27/2011 12:19 PM
Titan Technology Inc. Cryptography
John St John
Keller School of Management
Cryptography and Security
SE577
Professor William Umiwowicz
November 18, 2011
Titan Technology Inc. Cryptography
Table of Contents
Introduction3
Cryptographic Areas3-4
Executive Summary4-5
Titan Technologies Functionality5-6
Section 1: Feasible Attacks on Titan Technologies6-7
1A. Titan Cryptographic Plan7
Section 2: Digital Encryption Standards8
2A. Digital Encryption Standards8
Section 3: Password Based Encryption8-10
Password Based Encryption requirements9
Section 4: Good Passwords10-11
Establishing Password requirements10
Section 5: Biometrics11-12
Establishing Password requirements11
Section 6: Comparing of Algorithms 12
RSA Algorithm12
Diffie – Hellman “DH” Algorithm12
Elliptic Curve Diffie – Hellman Algorithm12
Section 7: Digital Signatures12-13
Digital Signature Process13
Section 8: Digital Signatures and Authentication13-14
Mutual Authentication14
One way Authentication14
Section 9: Security Recommendations14-15
Section 10: Recommendations for Titan Technologies15
Section 11: Conclusion15
Section 12: Executive Meeting Power Point Presentation15
Section 13: References16-19
Introduction
Titan Technology is a rapidly growing industry that was established back in 2006 with two best friend’s names David Miller and John Davidson, in their garage located in in Crystal Parks, Colorado. I began working for Titan Technologies in 2008 as the Senior Director of Security for the Corporation. The office that I work for is central located in Crystal Parks of Colorado. Titan Technologies current employs 220 employees along with 100 Work Stations and 80 laptops and 6 Servers for Database Applications. Titan Technologies utilizes a software and database application called (EDRNA) or Electronic Database Repository for National Archives....