What is the best method of encryption to deploy in a user-based, file encryption application?
Cardiff Metropolitan University
MetadataDangos cofnod eitem llawn
The purpose of this research was to discover the best method of encryption to deploy in a user-based, file encryption application. To come to a final conclusion a semi-structured interview was conducted and the various methods of encryption available were tested. The purpose of the semi-structured interviews was to get a better understanding of the users and their requirements. Overall, the findings found that the user base of such an application would be extremely varied in relation to knowledge of the subject area. Research also found that users would prefer stronger levels of encryption, sacrificing efficiency to a point. Tests were then conducted using numerous methods of encryption with the purpose of calculating their efficiency. The results of these tests were then correlated with the data gathered from the semi-structured interviews in order to help realise the answer to the research question. The factors taken into account when deciding on the final method were encryption strength and the efficiency of the process. Methods such as DES and ARCFOUR proved to be unfavourable as they did not offer a reliable level of security. Triple DES was average overall in its efficiency and research on triple DES showed that it was becoming an increasingly outdated method of encryption in modern cryptography, therefore triple DES was not considered. Blowfish and AES were the two remaining methods left for consideration. Whilst it is known that AES is a very secure method of encryption, results from the test showed that it lacked efficiency in comparison with Blowfish. The encryption method chosen was Blowfish with a key length of 448-bits. This was decided by the strength of encryption that it could deliver as well as the efficiency that it provided.
Yn dangos eitemau sy’n perthyn drwy deitl, awdur, pwnc a chrynodeb.
Dosanjh, Phavandeep (Cardiff Metropolitan University, 2016-04)ABSTRACT ‘Encryption protects more than your data; it's vital to a free society’ states Éxpressvpn (2016). Cryptography is around us more than realised and is vital to the privacy of our online lives. This research paper ...
Ly, Hai-Binh (2013-09)The purpose of the dissertation is to identify valid volleyball performance indicators of all technical skills and combined technical skills in non-elite volleyball using the original performance indicators and key performance ...
Nanova, Maria Roumenova (Cardiff Metropolitan University, 2014)The main focus of this survey is in the area of risk management and strategic investment management. The question of the connection between risk management and the investment process is fundamental. The investment process ...