Technical Details Plus Advantages

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Though it is a personal right and one of the most priced possession. People are defend the right of privacy as they know that by loosing it they will lose the control over there own lives. In our lives privacy is like a watch dog or a gate keeper. We feel protected with its presence. An interesting point here to note is that the concept of privacy is not isolated. It is a social phenomena. It is related to the

the political, economic and social condition prevailing in the society. The concept of privacy cannot be generalized as in many scenarios such as legal, political and business etc, the interpretation of the term privacy is complicated and difficult. In the business world the the flexible concept of privacy has increased the performance capacity of the business as it has reduced the time consumed in various procedures. Where on the political scene the concept of privacy is manipulated by keeping the records of the individuals to control terrorism, violence and crime etc. there is a strong argument in favor of surveillance. But in order to have a effective surveillance, in depth and detailed analysis is required for results.

Privacy in the today's world

The terms of life in the modern world has changed. Now the priced possession of an individual is offered as a commodity in exchange of service. In order to acquire any service or product it is essential for it is mandatory to provide information. That information is analyzed and stored at different levels. The common example of this exchange is the use of credit cards. When a person uses a credit card the information is used as a token security and the service are offered on the basis of it. This is one example and there are thousands of others where the individuals accept the continuous and non stop surveillance in order to get but some product or service. With time the lines between the surveillance and the privacy are fading and people are getting more elastic towards the concept of continuous monitoring. Surveillance includes the complete accountability of media, legislature, education and liberty. The government is also accountable for providing a legal framework for human rights, democracy and rights of communications. On the other hand surveillance involves different forms of monitoring, typically for the ultimate purpose of providing security and safety to the people (Goffman, 1959, pp. 519). Today the individual and private information is shared no matter what and on different levels.

�Technology is not the problem confronting our civil liberties, nor will it define the future of privacy�

Ideally the privacy protects the liberty and freedom of an individual. Personal information has become a virtual currency that can be offered in exchange. From creating an email to face book account everything requires the sharing of the personal information. An interesting point here is that the customer are willing to provide the required information. This does not stop on the information that we provide only. It also affects people relationship and dealing among themselves. Surveillance is a continuous process. As they continue to enhance their surveillance techniques such as interception and searching, while trying to make it legal at the same time (Webb, 2006, p111-112).

Today sharing information is considered as a quantum of credibility. It is a measure to assure the credibility of an individual. The only things that need to be considered her is what information should be shared and what should be retained. It is a matter of a personal will rather than liberty.

�Personal information is attached to a market decision in most cases and is increasingly hidden from view�

Personal information has different applications now. It is considered as a security, a commodity and a virtual currency. It is voluntary offered by the people to make the transaction easy, paced up and Convenient. With the increase of the application and utility of technology in the modern world the people are becoming more used to providing and sharing the information with others. There is no doubt that the flow of information increases the creditability of the individual, but an important point to consider her is that should be considered what information should be offered for sharing and what should be kept private.

The tendency of the people to willingly share the information is increasing. This is not because there basic norms have changed but because their bargaining power is low when it comes to the concealing the information that is required by the service or product provider. Some of the examples of basic necessities of life that are dependent on the information sharing are driving, opening back account and even shopping.

�It was even conceivable that they watched everybody all the time. �But they could plug in your wires whenever they want to. �From the habit that became instinct in the assumption that every sound you made was overheard� (Orwell, 2004, p9). Therefore a line needs to be drawn for the information sharing. As there is no line drawn between privacy concerns and the demands of service provision, traditionally the issue of consumer privacy is always left behind. Consumer�s privacy often defined as a market or technology dependent concept, often considered as a secondary concern because the more people will know about the risks the more concerned they will become. So, consumer�s privacy is becoming more and more attached with the market because increasingly people have only the choices offered there.

Strong justifications for a degree of surveillance at both the domestic and international level

Surveillance is used to predict and face the threats. Not only that it is used to trace and identify the criminals. �Ideally it is one of the most effective tools used by the government to maintain and enhance the safety and security of its citizen. For example, in China the internet activities were monitored to identify dissidents. In Arab revolution, internet monitoring was used to identify the causes of the revolt. �

This case and the verdict drew a line between privacy that is the right of every citizen and surveillance. To understand if the state surveillance undermines or promote democratic societies, we need to understand another important relation, the triangular relation between the technology, surveillance and the democracy. �With technology the government can intervene the personal life of an individual to a limit beyond estimation.

Technologies have revolutionized human life. Not only that new surveillance techniques and technologies have been developed such as cameras and web bugs to thermal scanners and GPS transponders that have increased the ability to track, observe, and monitor. Even the the group against the surveillance application cannot ignore as it is an effective tool to control and monitor the terrorism and violence. After 9/11 the world has turned into an unsafe place. This change has increased the need for more effective surveillance strategies and methods. The increase in terrorism and bloodshed has made every individual a potential victim, making every state vulnerable to a potential threat. Surveillance can help in prevention, but the limitations of surveillance are solely dependent upon the degree of its application.

Question 2

Quantum Cryptography

It is an ideal method of cryptology. Based on the mathematical calculation, it is one of the most commonly used mode of communication. It common used for the military and diplomatic purposes since the ancient Greeks (Alde et al., 1995). It is a secret method of information transmission and communication that is directed to the recipient only. Today's encryption method are threatened by the possibility of creation of the quantum computer. In any way the security of the data transmission cannot be compromised (Hunter & Duncan, 1995). Quantum cryptography enables the users to securely develop a secret key taking the advantage of the unique and unusual behavior of microscopic objects as well as to detect eavesdropping. In classical cryptographic methods, key distribution problem is the major setback. (Collins, 1992).

This method of communication is dependent on the quantum communication. In the world that we live in this cannot be compromised at all. The quantum key distribution (QKD) forms the foundation of quantum cryptography (Ekert, 1995).

Technical details plus Advantages

Bennett and Brassard first published the protocol for transmitting the private key using quantum techniques in 1984 which was the beginning for quantum cryptography. The limitations of the classical cryptographic methods inspired Stephen J. Wiesner to start his works on quantum cryptography in the late 1960s. The major drawback of the classical public-key and secret-key cryptography is that, when they are in different locations, methods of transmitting the key are subject to eavesdropping which is undetectable for the users (Alde et al., 1995; Collins, 1992). this issue was solved by identifying a secured key. This is how it works :

Step 1

Eric (Sender) picks a bit (b) Measures the basis and send encoded in chosen basis to Smile (Receiver) picks a basis and measures the chosen basis and records outcome

Step 2

Tells Smile (Receiver) which basis she used Eric which basis he used Both discard all rounds where Smile had chosen a different basis and convert the remaining data to a string of bits (forms the secret key) using a convention

If an eavesdropper intercept the photons and then send them to Smile, by running validity check eavesdropping can be identified from the errors into Smile final bit of string (Hunter & Duncan, 2002).

Limitations

There are some draw backs of the th quantum information over optical fiber is difficult because polarizations are not retained. On the other hand, transmitting through free space optics require shorter distances and ideal weather condition (Brains, 2002). the chances of the quantum cryptography to replace the classical cryptographic technique is very high (Brains, 2002; Hunter & Duncan, 2002).

Question 3

Individual contribution in solving �Question 1�

There are many dimensions of the questions along with the basic concept of privacy. The level of privacy required by the individual, limits to which the privacy can be compromised. This has been a topic of discussion on domestic and international level. In all the questions a dedicated and deep study of all the topic were required. The comparison study was made of the traditional privacy concept and the new market commodity privacy standards. As a member of the group I contributed my share in developing the knowledge of different standards on domestic and international levels. How vital it is to control terrorism and violence. I tried to understand how different countries and multinational are defining the basic right every of individual called privacy. There is a strong opinion in favor and against the flexibility that people have now a day relating to the privacy. Personal right and liberty is hugely threatened by the new concept of information sharing. Making information as the virtual currency has changed the norms of privacy. The personal boundaries have faded and changed.

This contributor was assigned as a member of the group to study these aspects of privacy which are major components of this TMA. To conclude the privacy is defined in many ways. In the modern world people have become more flexible. It has become a commodity that can be offered in exchange of goods and service in the modern world.

Individual contribution in solving Question 2

This question is about quantum cryptography, it is a state of the art, modern and secure method of cryptography today. My research included published journal, research papers and text books. Each member of the team was assigned individual task to solve this question. The participation was more focused on the technical details and review of the quantum cryptography, the protocol and mathematical aspects of quantum cryptography. The contribution also included easy writing and presentation of the the standard quantum cryptography protocol for the intermediate level audience.

Reviewing the technical papers and journals a simple presentation of BB84 protocol was prepared by this contributor which is an important part of this question of TMA. It was a team efforts and all the other team members we assigned different tasks. This included the origin & development of quantum cryptography, mechanism of cryptography, limitations of quantum cryptography, differences and similarity between the traditional cryptographic techniques and quantum cryptography, and the basic principle of cryptography. We all payed a essential role in making this possible. It was a challenging job difficult, but not impossible. This was because the topic is technical in nature. We have tried our best to make the topic commonly understandable.

Question 4

Optical Sensor and Solid-state Sensor:

Optical and solid state sensing is the two very common type of fingerprint acquisition and verification. It is also called �live-scan fingerprint capture�. It was first time used in 1970s. Where as silicon or chip sensors, become available in the middle of 1990s (Maltoni et al., 2003). Principal of optical sensing is based on frustrated total internal reflection (FTIR), where fingerprint placed on a glass surface (platen) is illuminated by a laser or LED. The reflection is captured on CCD or CM (solid-state camera).

CCD captures the light enhancing the impressions of the fingerprint, reflected from the glass. Here glass prism is used with diffused light reflects at the valleys and absorbed at the ridges (Zhou et al., 1998). Its image is three-dimensional surface and because of this reason optical sensor cannot be deceived by presenting a photograph or printed image of a fingerprint (Shigematsu et al., 1999). The image provided by the optical sensors is accurate but they required large sensing (Maltoni et al., 2003). This limitations is catered . There is no optical component in solid-state sensors and so they can be easily miniaturized.

Now how all this works. When the finger touches the surface of the silicon microchips, it converts the ridge/valley information into electrical signal using one of these four techniques: capacitive, thermal, electric field and piezo-electric. Capacitive and thermal solid state sensors are most commonly used in fingerprint verification. In capacitive sensors, strength of the electric fields is measured to determine the distance to the finger print ridges and valleys (Dickinsor et al., 2000). the difference between touching and no touching ridges are measured by temperature sensitive sensors. There is also pressure sensitive piezo-electric sensor that converts the topographic relief of the fingerprint to electric signal (Jung, 1999). these devices are economical and affordable. Because of the economy in cost, size and performance, they are most suitable for personal authentication in larger volume (Maltoni et al., 2003).



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now