0% found this document useful (0 votes)
14 views3 pages

Assignment3 (MTayyab-BCSM-F21-219) (Qasim Abbas-BCSM-F21-241) - IS&C

The document discusses the role of cryptography in securing modern web applications through a literature review, comparative analysis, and use case evaluations. It addresses current cybersecurity threats and explores post-quantum cryptography and blockchain integration, providing recommendations for implementing cryptographic practices. The research emphasizes the importance of adapting cryptographic methods to enhance security against evolving threats.

Uploaded by

Qasim Abbas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

Assignment3 (MTayyab-BCSM-F21-219) (Qasim Abbas-BCSM-F21-241) - IS&C

The document discusses the role of cryptography in securing modern web applications through a literature review, comparative analysis, and use case evaluations. It addresses current cybersecurity threats and explores post-quantum cryptography and blockchain integration, providing recommendations for implementing cryptographic practices. The research emphasizes the importance of adapting cryptographic methods to enhance security against evolving threats.

Uploaded by

Qasim Abbas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Superior University

Group Members

Muhammad Tayyab (BCSM-F21-219)

Qasim Abbas (BCSM-F21-241)

Section: Bscs-7B

Subject: IS&C

Instructor: Sir Khalid Hamid

Assignment 3
TOPIC: The Role of Cryptography in Securing Modern Web Applications.

Methodology

Literature Review
This step involves a thorough analysis of literature, technical papers, and key guidelines to establish the
development and application of cryptographic practices. The review covers a range of topics, including
symmetric key algorithms like Advanced Encryption Standard (AES), asymmetric algorithms such as Rivest-
Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), post-quantum cryptography, and blockchain
cryptography. Information is gathered from scholarly articles and peer-reviewed journals, industry-related
white papers, and cybersecurity research. These sources provide the foundation for understanding the
evolution and application of cryptographic practices. [10]

Comparative Analysis
A comprehensive comparison is made between conventional and new-generation cryptographic methods,
focusing on yield, bandwidth, computational complexity, resource utilization, and resistance to quantum
threats. This comparison helps identify the strengths and limitations of various cryptographic approaches. It
also provides insights into their applicability in securing contemporary web applications, offering
recommended measures for practical use. [4]

Use Case Evaluation


Cryptographic methods are evaluated using real-world examples. Hybrid encryption techniques, such as AES
and RSA combinations, are assessed for their effectiveness in securing information transfer in e-commerce and
financial services. Blockchain technology is analysed for its role in creating tamper-proof ledgers for
decentralized authentication and secure transactions. Lightweight cryptographic solutions are explored for
their potential in resource-constrained environments, such as IoT devices and mobile platforms. These
evaluations demonstrate the practicality and adaptability of cryptographic techniques in diverse use cases.
[10]

Threat Assessment
Current cybersecurity threats, including phishing, SQL injection, cross-site scripting (XSS), man-in-the-middle
(MITM) attacks, and zero-day vulnerabilities, are analysed. The study highlights how cryptographic methods
address these challenges, with a special focus on securing APIs, user credentials, and data storage in web
applications. Cryptographic techniques are shown to play a critical role in mitigating these risks and ensuring
robust data protection. [7].

Post-Quantum Cryptography Exploration


The potential impact of quantum computing advancements on cryptographic security is explored. The research
examines vulnerabilities introduced by quantum algorithms such as Shor’s and Grover’s and evaluates
countermeasures, including lattice-based, hash-based, and multivariate polynomial cryptographic techniques.
These analyses emphasize the importance of preparing for quantum threats and adopting quantum-resistant
cryptographic approaches. [6]

Blockchain Integration Analysis


The integration of Blockchain as a cryptographic technology is investigated for its use in developing distributed
identity solutions, verifying data authenticity, and securing transactions. The study examines Blockchain
scalability and the challenges associated with its incorporation into existing web application frameworks. By
addressing these aspects, the research highlights Blockchain potential to enhance security in contemporary
web applications. [2]

Performance and Efficiency Review


The interconnection and trade-offs within cryptographic implementations are analyzed, focusing on challenges
such as key management in symmetric encryption systems, the computational costs of asymmetric encryption
for high-frequency web applications, and the suitability of lightweight cryptographic methods for IoT devices
and mobile platforms. This review sheds light on the performance and efficiency of cryptographic methods in
various operational contexts. [7]

Recommendation Development
Based on the analysis, practical recommendations are proposed for implementing cryptography in modern
web applications. These include designing hybrid encryption system frameworks, gradually incorporating
Blockchain for secure and decentralized operations, and adopting quantum-resistant algorithms to address
emerging quantum threats. These recommendations aim to provide a comprehensive framework for
safeguarding web applications against current and future cybersecurity challenges. [[10]

Sampling
Include participants from different age groups, educational backgrounds, and employment statuses, who
evolve in advance Web Development. It is a selective sampling.

References:

[1] J. Höglund, S. Lindemer, M. Furuhed, and S. Raza, ‘Towards public key infrastructure for the Internet
of Things’, Comput. Secur., vol. 89, p. 101658, Feb. 2020, doi: 10.1016/j.cose.2019.101658.
[2] A. M. Abdullah, ‘Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data’, 2017.
[3] N.-A. Sireteanu, ‘Security Challenges of Modern Web Applications’, SSRN Electron. J., 2009, doi:
10.2139/ssrn.1529803.
[4] S. M. Idrees, M. Nowostawski, R. Jameel, and A. K. Mourya, ‘Security Aspects of Blockchain
Technology Intended for Industrial Applications’, Electronics, vol. 10, no. 8, p. 951, Apr. 2021, doi:
10.3390/electronics10080951.
[5] C. Paar and J. Pelzl, ‘Understanding Cryptography as a Complete Source’, 2022, doi: 10.1007/978-3-
642-04101-3.
[6] M. Kumar, ‘Post-quantum cryptography Algorithm’s standardization and performance analysis’, Array,
vol. 15, p. 100242, Sep. 2022, doi: 10.1016/j.array.2022.100242.
[7] M. Hussain, A. W. A. Wahab, I. Batool, and M. Arif, ‘Secure Password Transmission for Web
Applications over Internet using Cryptography and Image Steganography’, Int. J. Secur. Its Appl., vol. 9, no. 2,
pp. 179–188, Feb. 2015, doi: 10.14257/ijsia.2015.9.2.17.
[8] B. Arunkumar and G. Kousalya, ‘Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS’,
Comput. Syst. Sci. Eng., vol. 40, no. 1, pp. 179–190, 2022, doi: 10.32604/csse.2022.018166.
[9] A. kumar singh Gurasis singh and Harmanpreet singh, ‘Network Security and Cryptography’, SCSE
Lovely Prof. Univ. Phagwara 144001 Punjab.
[10] K. Sasikumar and S. Nagarajan, ‘Comprehensive Review and Analysis of Cryptography Techniques in
Cloud Computing’, IEEE Access, vol. 12, pp. 52325–52351, 2024, doi: 10.1109/ACCESS.2024.3385449.
[11] E. A. Fischer, ‘Cybersecurity Issues and Challenges: In Brief’, Eric Fisch. Sr. Spec. Sci. Technol. August
12 2016, 2022.
[12] J. M.Anusha and Sasi Kiran, ‘Cryptography: The Sciene of Secure Communication’, IJCSNS Int. J.
Comput. Sci. Netw. Secur. VOL16 No4 April 2016, vol. 12, 2024.

You might also like