Cryptography Information Systems Technology Has Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account).

Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card reader to complete a transaction; the card reader will debit or credit the transaction value from or to the card.

The author further asserts that Smart cards can be utilized for various purposes.

In most cases they are used as stored value cards (Misra et al., 2004). Stored value cards can be utilized at the time of purchase and are preloaded with a certain amount of money. These cards can be discarded after they have been used; however, most stored value cards can be reloaded and used repeatedly (Misra et al., 2004). Stored value cards are popular gifts at Christmas time and are usually referred to as gift cards.

The author further explains that Smart cards, because of their nature, may be considered as electronic cash. Smart cards that do not need a physical contact with a reader (contactless cards), can be used for applications such as highway tolls where a motorist does not have to stop to pay for the toll. Since smart cards can be used to hold any kind of information, we can expect to see applications of this medium grow in the future (Misra et al., 2004 page15)"

The original purpose of smartcards was to reduce reliance upon paper forms of money such as cash and checks.

Although smart cards have not yet replace cash and checks the prevalence of these instruments has grown substantially. The orders for smart cards increased form 1.79 billion in 2000 to 2,55 billion in 2002 (Misra et al., 2004). Also, the number of cards distributed internationally increased from 900 million in 1997 to 6.31 billion in 2003 (Misra et al., 2004). In addition smart cards are utilized by several different industries including transportation, healthcare and banking (Misra et al., 2004).

As a result of the increased use of Smart cards (in all their various forms), there has been a concerted effort to formulate encryption systems that lessen the likelihood of fraud. To this end, cryptography is often used to secure the information on the card or to ensure that the card can not be used by an unauthorized person. There are many ways this can be accomplished through cryptography.

Smart Cards for Identification

In addition to using smart cards for purchases, they can also be used for identification purposes. The use of smart cards for identification purposes can often be seen in places of business and in government. This type of smart card contains a chip that identifies the person with the card and may grant access to various parts of an office or even to the office computer system. In some cases these cards are also used by employees to clock in and out of work. The primary purpose of using smart cards for identification is office and organizational security. This is particularly true at government facilities, where security issues have taken center stage as a result increased threats of terrorism.

According to Piazza (2005) the smart cards used for identification purposes are among the most technologically advanced devices available. In some cases, they even contain biometric information to ensure that the individual can have access to a building or classified information. Biometrics is inclusive of such things as iris scans, fingerprinting and face recognition (Piazza, 2005). In addition newer biometrics technologies include systems that can analyze vein structure, odor and gait (Piazza, 2005).

Because smart cards can hold extremely sensitive information encryption is essential. As with the other technologies that have been discussed, cryptography provides the security needed to prevent others from deciphering this sensitive information. There are several different cryptography systems that can be used to secure smart cards. One such system is the elliptic curve cryptography. According to Al-Kayali (2004) elliptic curve cryptosystems have grown tremendously in popularity as it relates to the securing of smart cards. Elliptic curve cryptography is a rather complex concept to explain but it is actually a type of "public-key cryptography based on the algebraic structure of elliptic curves over finite fields (ECC)." The elliptic curve is used primarily in the field of mathematics but its use as a form of cryptography to secure smart cards has been developed in recent years. Many experts believe that the use of this type of cryptography is so difficult to manipulate that it provides very good security for smart card systems.

It is evident that smart cards are increasing in popularity both in the sphere of electronic cash and identification. In the years to come there will most likely be an increased emphasis placed of the securing of this type of technology. It is also apparent that different forms of cryptography will be used to ensure that private information contained on smart cards remains private.

Content Delivery Services

Another growing aspect of information technology is content delivery services. Content delivery services are designed to allow users to access content over cable television, pay per view and the internet. An example of such technologies can be seen with Apple's iTunes platform that allows for the downloading of music and videos. This can also be seen with the Netflix platform which allows for the download of movie selections. There are also many other companies that utilize content delivery services.

According to Mitrou (2004) content delivery services are part of an industry that will continue to row in the years to come. Users enjoy content delivery services because they provide instant access to music, videos and music; people are no longer required to go to the store to get these products. Although content delivery is convenient it also poses certain security concerns. This is particular true of music and media that is contains copyrighted material. For this reason, businesses that provide content delivery services must do all they can to protect this material and prevent from being copied or shared.

In recent years this has proven to be quite a challenge. Both music and movies are readily available on the internet through sites that allow users to share movies and music. Although such file sharing is illegal it is very difficult to control because various methods used to encrypt music and movies have failed. As a result, programs such as iTunes use more advance technologies to deliver music and videos in a manner that is more secure. These companies use cryptography to prevent customers from downloading music without paying. The encryption program also makes it difficult to transfer music to other programs that might allow the user to share the music with other users.

The primary cryptography system that is utilized for content delivery services is content access. According to Frauenfelder (2005) the iTunes music store uses conditional access to secure or restrict the availability of files and resources. The content access system is combined with a Digital Rights Management System. These systems are utilized simultaneously to ensure that users do not have access to a download until Apple has received payment for the download (Frauenfelder 2005).

In addition to protecting the content that is delivered, cryptography is also used to ensure that credit card information is not stolen. This aspect of security is extremely important because iTunes users and users of other content delivery services are asked to save their credit card information so that it will not have to be taken every time the user wants to purchase a product for download. As such iTunes is responsible for the private information of many users and must take special care to ensure that this information is secure.

Cryptography in Ecommerce and Healthcare

Any industry or organization that utilizes computers has a need for cryptography. Within the context of Ecommerce and Healthcare cryptography is important because of the type of sensitive information that is at stake. In the case of Ecommerce, customer information including phone numbers, addresses and credit card information are transmitted on a daily basis. As it pertains to healthcare this same type of information is transmitted in addition to private medical information.

Cryptography solutions for ecommerce are often inclusive of such things as certificates and certificate authorities. According to a book entitled "Control and Security of Ecommerce" Certificate authorities are designed to issue digital certificates that allow ecommerce partners to be positively identified when engaged in electronic transactions (Smith, 2004). Although most ecommerce businesses have password protections, the author points out passwords can easily be cracked or compromised. In fact the author points out the existence of password cracking software that can be downloaded off of the internet (Smith, 2004). Needless to say, the presence of this type of software makes…[continue]

Cite This Term Paper:

"Cryptography Information Systems Technology Has" (2007, October 10) Retrieved October 25, 2016, from

"Cryptography Information Systems Technology Has" 10 October 2007. Web.25 October. 2016. <>

"Cryptography Information Systems Technology Has", 10 October 2007, Accessed.25 October. 2016,

Other Documents Pertaining To This Topic

  • Geographical Information Systems in Armed

    Knowing in advance the terrain, the vegetation, and the water sources prepares the mission teams with the knowledge to confront the elements associated with the geographical conditions of the site. Analysis provides information for determining in advance the best sites to set up base camps, where the terrain is less vulnerable to hostile advances. It demonstrates in advance how supplies will most efficiently and expeditiously be delivered to the

  • System Security Every Organization Which

    Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

  • Information Age Has Created Privacy Problems for All Citizens

    Privacy in the Information Age Privacy has never been as problematic an issue as it has been as a result of the information age. Because of lightning fast developments in information systems and technology, the mere use of a password has long ceased to be sufficient to ensure privacy when using the computer. Similarly information systems are used for surveillance of citizens while on any expedition outside of their home, from

  • Information Assurance

    Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both

  • Information Technology IT Security Systems

    Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

  • Information Technology Cryptography a Public Key

    Certificates can be personal or set up by the users for certain trusted authorities. Once an SSL connection is recognized, the server certificate in use can usually be scrutinized by looking at the assets of the page conveyed over the SSL connection. Certificates and keys are normally stored on the hard disk of the computer. Additionally to needing a password when the private key is used, it is typically

  • Cryptography History of Cryptography the

    In this manner, if the transmitted information is intercepted by a cyber-thief, the information will remain useless to him since it is in an encrypted form that is incomprehensible to him. Banks is another common user of cryptography and whose input and output information are critical and must remain confidential. These days, a large percentage of banking transactions can be done online. Hence it is very critical that the information

Read Full Term Paper
Copyright 2016 . All Rights Reserved