Table of Contents
Sankaran and Krishna (2011) commented on the essential fact that the encryption and decryption plays an important role in security of the Information Technology organizations. In today’s tech savvy world, the essentiality of encryption and decryption of the data and information are done in order to reduce redundancy as well as secure the data to the maximum extent.
The aim of the research work is to find the effectiveness of encryption and decryption in the IT organizations such as Apple Inc. Moreover, it also aims in understanding the necessity of encrypting the data for the security of the data and information of the organization. Moreover, the research also aims in understanding the operation of the encryption and decryption in the security of data.
H0: Encryption and Decryption of the data helps in increasing the security of information within the organization.
H1: Encryption and Decryption of the data does not help in increasing the security of information within the organization.
Kumari Sharma et al. (2013) commented on the essential fact that encryption is the method of translating the plain text to cipher text. On the other hand the decryption is a method that helps in converting the encrypted cipher text into plaintext. The major goals of encryption and decryption of data is to secure the data in the most advanced way and hence prevent the hackers and the 3rd party intruders to get access to the data and make changes to the data.
According to the outlook of XIE and Guo (2013) encoding is the process that helps in translating the entire text into cipher test and in contrast decoding refers to the process of re-translating the entire cipher r=text into the plain text. It focuses in improvement of the security level that increases in performance of the overall organization. There are two types of encryption and decryption- symmetric and asymmetric key cryptography based on its operation and usage of keys. From the viewpoint of Choi and Lee (2015) the symmetric key cryptography utilizes same key for encryption and decryption. On the other hand asymmetric cryptography uses two different keys for encoding and decoding.
As commented by Verkhovsky (2011) the DES use only 56 bits key whereas AES contains 128, 192 and 256 bits key. DES is restricted only to usage of 64 bits whereas AES is restricted to the usage of 128 bits. Moreover DES encryption is an old technique of encryption and decryption whereas AES is comparatively new.
This section deals with the encoding and decoding of data and about the encryption and decryption. Moreover the comparative study of DES encryption and AES Encryption is also discussed vividly.
The research approach is basically is a underlying relationship between the theories, principles and hypothesis that has been adopted for the research work (Pang et al. 2012).In this research work the inductive research design is used since it is concerned with the emergence of data for the new theories. It helps in identification of new theories in the research work for further research and studies.
Kumari Sharma et al. (2013) commented that research design deals with the process and procedures that helps in collection of data and analyze it along with the interpretation. It is basically the blueprint of the research work that involves the whole method of conduction of the research work successfully. For this research work the descriptive research design has been adopted. It helps in understanding the studies to the depth by analyzing the data collected.
In this case study research work the research philosophy used is post-positivism since it accepts the background, values, theories and concepts that are accepted and can influence the thing that is observed (Verkhovsky, 2011).
For accomplishment of the research work, both primary and secondary data are collected.
25 developers involved in encryption and decryption are interviewed and 5 managers of Apple Inc. are also interviewed.
The University laws along with the company laws and regulations are kept in mind during conduction of research work.
Getting access to the resources, monetary constraints and time limit are the major limitations.
Choi, W. and Lee, J. (2015). Design of a Key Scheduler for Supporting the Parallel Encryption and Decryption Processes of HIGHT. Journal of Sensor Science and Technology, 24(2), pp.107-112.
KumariSharma, R., R. Biradar, S. and P. Singh, B. (2013). Shared Architecture for Encryption/Decryption of AES. International Journal of Computer Applications, 69(18), pp.1-6.
Luo, S. and Chen, Z. (2014). Hierarchical identity-based encryption without key delegation in decryption. International Journal of Grid and Utility Computing, 5(2), p.71.
Pang, L., Li, H., Pei, Q., Liu, Y. And Wang, Y. (2012). A Public Key Encryption Scheme with One-Encryption and Multi-Decryption. Chinese Journal of Computers, 35(5), pp.1059-1066.
Sankaran, K. and Krishna, B. (2011). A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images. International Journal of Information and Education Technology, pp.137-141.
Verkhovsky, B. (2011). Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls. International Journal of Communications, Network and System Sciences, 04(07), pp.475-481.
XIE, H. and Guo, D. (2013). Reconfigurable serial AES encryption and decryption circuit design. Journal of Computer Applications, 33(2), pp.450-454.