What Could Cause Your Subaru's Touch Screen To Stop Working
assign3.docx
1. Q.1 Identifywhat Taming Sari EncryptionSoftwaredoes. Youmay listdown all its
features.
Taming Sari software is used to protect the confidentiality of your files and data. It is
based on 2 factor authentication of cryptographic algorithm. It has many features but
some of the key factors of taming Sari encryption Software are:
Strong encryption by using MySEAL approved algorithms
Safe environment of file sharing
Encrypted conversation
It monitors files too
Quick encryption and decryption process
It runs on both Mac and on windows OS
2 Factor authentication
Not easy password exchange
Q.2 The software enables you to share the encryptedfile with other people, by
just specifying the recipient’s email address during the encryptionprocedure. It
uses a concept called Digital Envelope. The sender does not have to inform the
recipient of the file, what is the encryptionkey that he/she used to encrypt the
file. Investigate, how is this possible. Explain the possible steps.
It is considered to be the strength of Taming Sari Encryption Software. Key management
in Taming Sari is done in the advanced cryptographic algorithms. The encryption keys of
Taming Sari users are never stored on the Taming Sari server. They're created with 256-
bit length and safeguarded at the user's device using Taming Sari's superior risk
management.
Furthermore, if a user desires to share a secured file with another person, there is no
need for the user to provide the secret key used during the encryption procedure to the
recipient. Taming Sari's smart and secure Key Management handles it.
2. True Random numbers 256 bits buffer of random bits generated. Each time PGP expects
a keystroke from the user and it records.
3. Q.3 Basedon your finding above, do you think Taming Sari implements a secure
encryption protocol? Justify your answer
Yes, based on my above findings I have come to the point that Taming sari implements a
secure encryption protocol. It is very beneficial to use for the data security. Its randomly
generation of 256 bits key system make it mor secure and very much difficult to breach.
And all of the above it is very easy to use.
Q.4 Based on your usage of Taming Sari, do you find out any weakness of the
system? If yes, please describe the weakness. Otherwise, identify its strength.
I did not find any weakness by the usage of Taming Sari but I think the trail version of the
software would have to add more users and some more fields should have to be explored
before shifting to the subscribed version of Taming Sari Encryption Software. Otherwise I
found it very strong and encrypted software. Easy to select and protect files or type your
confidential conversation test later share your protected files or confidential conversation
with authorizes parties. There is also a tracking system available to monitor data it help
in tracking of any data leakage. Key system is very much strong and it is 2 step verification
based.
Q.5 Identify, what are the possible cryptographic algorithmsusedinTaming Sari.
State its functionality too
Standard symmetric encryption algorithms include RC4, AES, DES, 3DES, and QUAD.
Standard asymmetric encryption algorithms include RSA, Diffie-Hellman, ECC, El Gamal,
and DSA. Both data in transit and data at rest can be kept confidential and secure using
cryptography. It can also guard against repudiation by authenticating senders and
recipients. Many endpoints, often multiple clients, and one or more back-end servers are
common in software systems.
Q.6 The software implements 2 Factor Authentication. Describe what factor it
implements, and does it improve the security of Taming Sari? Explain your
answer.
Two-factor authentication (2FA) is a security solution that requires two different forms of
identity to gain access to something. A password is the first factor, and the second is
usually a text message with a code sent to your smartphone, or biometrics utilizing your
fingerprint, face, or retina.
Q.7Statewhetherdoyou likeusingTaming SariEncryptionSoftware,andreasons
to your answer.
4. Yes, I like using Taming Sari encryption software the reason is its too much secure and its
key system is tremendously impressive. It gives Protection of valuable information
Security for user. It controls access, protects data, protects the system from viruses and
network/Internet breaches, and protects against other system-level security threats.
Q.8 Basedon your knowledgethat youhave gainedfrom Cryptographyand other
security classes;howdo you want to improve Taming Sari Encryption Software?
Confidentiality − Encryption technique can guard the information and communication
from unauthorized revelation and access of information.
Authentication − The cryptographic techniques such as MAC and digital signatures can
protect information against spoofing and forgeries.
Hashing algorithms and message digests are used in cryptography to maintain data
integrity. The receiver is ensured that the data received has not been tampered with
during transmission by giving codes and digital keys to confirm that what is received is
legitimate and from the intended sender.
So that is why I think Taming Sari is best in its own encryption software competition it.