Abstract The last two decades has experieneced the development of numerous cryptographic algorithms and systems. Steady advances in the area of computing as well as in the science of cryptanalysis have made it imperative to adopt new and stronger encryption technologies that have larger key sizes. The use of a reliable and a strong encryption technology can help in providing confidentiality Cheap Mark Scheifele Shirt , integrity, non-repudiation as well as authentication for communications taking place in public networks, storage and many more. Many of the cryptographic algorithms in the past have been attacked, broken, or even proven insecure. Advances in the area of computing are providing a baseline for the development of stronger cryptographic algorithms that can be hard of even impossible to break. The next generation encryption standards provide the best technologies that are useful for the future cryptography in setting the industry trend. In this paper Cheap Josh Morrissey Shirt , there is the presentation of two newest encryption technologies that are: the first quantum key distribution network and the advanced encryption standard.
鈥?br > The Advanced Encryption Standard The advanced encryption standard abbreviated as AES is an encryption technology based on symmetric block ciphers mostly used in the United States government to protect their classified information (Moharir & Suresh, 2012). The technology is implemented in both hardware and software across the globe to encrypt sensitive data. The U.S uses this technology in encrypting sensitive government information, and it was developed for easy implementation in both hardware and software as well as in restricted environments such as in smart cards. The technology provides a good defense against various techniques of attack (Selent, 2010). It is the most popular encryption technology used especially in the symmetric key cryptography, and it is more secure compared to its predecessors (NCIS & Lei Cheap Joel Armia Shirt , 2012). Advantages of the AES 鈥?The AES is less susceptible to cryptanalysis as compared to its predecessors such as 3DES 鈥?It supports large key sizes as compared to other cryptography technologies like 3DES 112 or 168 bits 鈥? The technology is fast in both software and hardware 鈥?The technology鈥檚 128-bit block size makes this technology less susceptible to any form of attack 鈥?AES is a requirement by the latest US as well as the international standards. Disadvantages of AES 鈥?The side-channel attacks have been proven to break the AES cryptography in some products particularly those that do not implement the technology in the right way (NCIS & Lei, 2012). The Quantum Key Distribution Technology The Quantum Key Distribution (QKD) is the newest encryption technology that is being used in the United Sates to protect networks, and it is un-hackable for now and even in the future (Chen, Y. et al., 2009). The first installation of this technology took place in the year 2013 in the US networks linking the headquarters in Columbus those in the manufacturing facilities in Ohio and Dublin. The Battelle Institute Researchers are the founders of this encryption technique or networks Cheap Connor Hellebuyck Shirt , and it has been found that the technology offers the best technically feasible way of generating secure encryption that won鈥檛 leave data exposed even in the future (Daemen & Rijmen, 2012). The technology works by tapping the quantum, physics鈥?stranger phenomena, thus making it virtually impossible to steal the encryption key minus the sender and receiver being are of it. QKD is useful for protecting the sensitive data for years. The encryption uses the keys that have generation and distribution via the quantum cryptographic technologies. It helps the potential users of the network such as financial institutions, government agencies or institutions with distributed subsidiaries to encrypt their confidential information using the highest level of security (NCIS & Lei Cheap Michael Hutchinson Shirt , 2012). Then Advantages of Quantum Key Distribution Technology 鈥?It provides the solution to the key exchange problem 鈥?It allows completion of different cryptographic tasks conjured or proven to be impossible with the use of just classical communication. 鈥?The security of this technology can be proven mathematically even without imposing restrictions on the eavesdropper, something that cannot be possible with the classical key distribution. 鈥?QKD is securing against quantum, computers because its length does not rely on the mathematical complexity, but on the physical principles. Disadvantages 鈥?QKD has a limited range as well as difficulties in the sharing of keys (Watrous, 2009).鈥?br > References Chen Cheap Dustin Byfuglien Shirt , Y. et al. (2009). Embedded security framework for integrated classical and quantum cryptography in optical burst switching networks. Security and Communication Networks, 2, 546-554. Moharir, M. & Suresh, A. (2012). A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security. International Journal of Network Security & Its Applications (IJNSA) Cheap Nikolaj Ehlers Shirt , 4(1). NCIS (Conference), & Lei, J. (2012). Network computing and information security: Second international conference, NCIS 2012, Shanghai Cheap Bryan Little Shirt , China, December 7-9, 2012, proceedings. Berlin: Springer. Selent, D. (2010). Advanced Encryption Standard. Rivier Academic Journal Cheap Jacob Trouba Shirt , 6(1). Watrous, J. (2009). Zero-Knowledge against Quantum Attacks. SIAM J. Comput. 39 (1): 25鈥?8.
Sherry Roberts is the author of this paper. A senior editor at Melda Research in legitimate paper writing services if you need a similar paper you can place your order for a custom research paper from write my research paper online.