The Limitations of Modern Cryptography

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

The Limitations of Modern Cryptography

Author: Rachel Laura M | Published on June 16, 2015 | Views: 2410

The Limitations of Modern Cryptography - CybraryIndividuals now own multiple electronic devices – from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and confidential information are more prevalent than ever.

Protection of this information is crucial – as information can travel across the world in mere seconds. Cryptography provides protection and plays an integral part in against fraud in electronic transactions and anything that involves important financial information. Cryptography can verify and individuals identity and keep someone anonymous. Used on a company web page, it can prevent vandals from making unwanted and unauthorized changes and can also keep competing companies from reading confidential information.

As communications continues to move away from humans and more towards machines, cryptography becomes more vital. However, as crucial and necessary as cryptography is and as much protection as it can provide, it’s not without limitations.

Unfortunately, many cryptography products available in today’s market do not provide nearly the level of security necessary to keep confidential information where it needs to be. The reason is most cryptography products were designed by engineers, as just another component of engineering. Yet, cryptography is its own entity and needs to be treated as such.

Companies spend billions of dollars on cryptography tools that are insecure and weak, but have not been broken into, as they are still new. Once they become available and widely used, they’ll become vulnerable to cyber threats and attacks.

Electronic attacks and vandalism are becoming increasingly serious. Widely publicized attacks include hackers altering the CIAs web page, Internet providers being mail bombed and a data breach that affected thousands of holiday shoppers at Target. Present-day cryptography systems are just ‘good enough’ and then huge breach occurs.

How can companies cope with the limitations of cryptography and develop a strong system to safeguard their vital information? First and foremost, a strong design begins with a threat model. The threat model takes the following factors into account:

  • What and who is the system designed to protect?
  • For how long?
  • Who will use the system?
  • How will it be used?
  • What are some things that are tempting to attackers?

Using the threat model, both product designers as well as consumers determine the necessary security measures. An experienced cryptographer will be able to design a system that creates a good balance between accessibility, privacy, accountability and anonymity.

Want to learn more about cryptographic tools and threats to cryptography? Find these courses and other free cybersecurity training with us!

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel