T209 Page
Welcome to Toni's Pad
 
Ou Stuff -> T209 Home Page

I GIVE NO GUARANTEE ABOUT THE ACCURACY OF THE INFORMATION AND ASSIGNMENTS
CONTAINED ON THESE PAGES, PLEASE VERIFY ANY INFORMATION WITH OTHER SOURCES.


TMA 5 ~ Data Encryption

Following our coursework on data encryption and the system of private and public keys we then had to use PGP software to create our own set of keys and send and receive encrypted data to other students. We provided evidence of this in our TMA.

The report this time was for the management of Universal Open Solutions of no more than 1500 words. They wanted to run a competition among the staff for suggestions on how to take the company forward. They wanted to investigate running the competition anonymously using data encryption software. We were required to give details of the how and why of data encryption together with appendixes covering a technique called blinding.

------------------------------------------------------------------------------

Introduction submitted as part of my report.

In our advanced technological world the protection of digital information has become vitally important. There are a variety of reasons for encryption, secrecy and data integrity are two examples. There are also different methods of encrypting. As computer systems become more sophisticated the encryption process also develops to become more complicated and as unbreakable as possible.

Conclusion submitted as part of my report.

Universal Open Solutions can use encryption to allow their employees to make anonymous suggestions that could benefit the company. Using the blinding protocol an appropriate staff member can check that the suggestion comes from a bona fide employee and that each employee has submitted only one suggestion. Because of the blinding protocol the staff member would be unable to read the suggestion or tamper with it. Finally using the binding protocol and a Nonce issued to the employee Tom can later verify the identity of the winners.

Bibliography

Monk, J. (2002) 'Security Techniques in Digital Systems' Open University

Nott, T. (2002) Personal Computer World, Sept, pp. 123-133



 

Copyright © 2004 Toni Walton All Rights Reserved.