Preview

Nt1310 Unit 7 Exercise 1

Powerful Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Exercise 1
1. Triple DES

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.
2. RSA

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the
…show more content…
Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. It’s definitely one of the more flexible encryption methods available.
4. Twofish

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.
5. AES

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally useDirect Memory Access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Better Essays

    * The RSA scheme is a block cipher in which the plain text and cipher text are integers between 0 and n-1 for some n.…

    • 1928 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3x56 = 186 bits a triple encryption with two keys maybe used.…

    • 875 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    In 1976, after voicing their disapproval of DES and the difficulty in handling secret keys, Whitfield Diffie and Martin Hellman published the Diffie-Hellman algorithm for key exchange. This was the first published use of public key cryptography, and arguably one of the cryptography field’s greatest advances…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Data Encryption Standard

    • 2617 Words
    • 11 Pages

    Bibliography: [1] Data Encryption Standard, Federal Information Processing Standards Publication (FIPS PUB) 46, National Bureau of Standards, Washington, DC (1977). [2] Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York.…

    • 2617 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Accounting

    • 7868 Words
    • 32 Pages

    Encryption is the primary method of achieving confidentiality in e-commerce. Plain-text messages are rearranged by some mathematical process. The encrypted message cannot be read by anyone who does not know the process.…

    • 7868 Words
    • 32 Pages
    Good Essays
  • Better Essays

    The Setup algorithm takes as input the depth of the key structure supported and generates a master key and a public key for the scheme. KeyGen takes the master-key generated by the setup, a user’s identity and an attribute set as input, and produces a secret key for the user. Encrypt algorithm takes as input the public key of the scheme, along with a message and an access tree, and generates a ciphertext as output. Finally, Decrypt takes a ciphertext and a secret-key (produced by KeyGen), and if the access-tree used to construct the ciphertext is satisfied by the attribute set for which the secret-key was generated, then it recovers the message from the ciphertext. Each of these algorithms are explained in detail…

    • 1837 Words
    • 8 Pages
    Better Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The key size of DES is 56 bit which is comparatively smaller than AES which has 128,192, or 256-bit secret key.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security

    • 3919 Words
    • 16 Pages

    • A “hash” is a short function of a message, f ti f sometimes called a “message digest” g g • BUT: a hash is not uniquely reversible • Many messages have the same hash…

    • 3919 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Emery Jou received the B.S degree in physics from Tsing Hua University, Hsinchu, Taiwan, the M.S. degree in computer science from the University of Texas at Austin, and the Ph.D. degree in computer science from the University of Maryland, College Park. He is currently a Research Scientist with the Institute for Information Industry, Taipei, Taiwan. He was with several Wall Street firms in the United States for more than 12 years (i.e., Morgan Stanley and JPMorganChase) as a System Architect for Security Transaction Processing through Single Sign-on and Public Key Infrastructure. He was also with Thales nCipher, Cambridge, U.K., where he was engaged in Tape Storage Data Encryption and Key Management Systems. In 2009, he was a Visiting Professor with the College of Computer Science, National Chiao Tung University, Hsinchu. He was also a consultant for the Industrial Technology Research Institute, Hsinchu.…

    • 8550 Words
    • 35 Pages
    Powerful Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.…

    • 2454 Words
    • 10 Pages
    Better Essays