Preview

Symmetric Encryption

Satisfactory Essays
Open Document
Open Document
322 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Symmetric Encryption
Symmetric Encryption
Sherrie Brown
DeVry University

It is our understanding that your institution has completed a recent collaboration. While each establishment handles immensely sensitive information, it is to your best interest to utilize the most current cryptology that technology offers. In consideration of the nature of the respected material I suggest your Chief Information Officer fervently consider implementing Symmetric Encryption.
Symmetric Encryption is the oldest and best known encryption device/technique. The method contains a secret key which can be a series of random letters, a name, number, or even a word which is applied to the text portion of a message in order to change the content in a particular way.
The content may be altered in a way that could be as simple as rearranging the text by shifting each letter by a number of places in the alphabet. With this method, the sender and the recipient must know the secret key. This ensures their ability to encrypt and decrypt all messages that use this key and is generally faster.
The algorithms associated with this technique are considered extremely secure and is adopted by the Advance Encryption Standard (AES) with whom the United States Government utilizes to store classified and top-secret files and information.
There is one weakness in the symmetric encryption program and that is, a single key must positively be shared, which presents a prime opportunity for it to be leaked or stolen.
Overall, the symmetric encryption technique is less costly to implement and is the most secure encryption method to date. Please consider carefully the outlined advantages for this method. I encourage further investigation of the attributes pertaining to utilization of symmetric encryption prior to importing this system.

References
Conklin, Wm. Arthur (William Arthur) (2010), Principles of Computer Security : CompTIA Security+ and Beyond. New York, NY: McGraw, Hill Publishers.



References: Conklin, Wm. Arthur (William Arthur) (2010), Principles of Computer Security : CompTIA Security+ and Beyond. New York, NY: McGraw, Hill Publishers. (http://support.microsoft.com/kb/246071) ( http://www.wisegeek.org/what-is-an-encryption-key.htm)

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Using the table given the encryption strategy for Richmond investments would go as follows. I will be using the privacy or confidentiality objective. The basic description for the privacy or confidentiality objective is to keep information secret from all person or persons, except those who are authorized to see it have access. In other words, no one without authorization will be able to gain access to sensitive company information or client information, such as addresses, names, billing information, credit card information, and other personal information. The security option needs to be implemented on all networks in the company’s domain. The public key infrastructure is a set of hardware, software people policies and procedures needed to create, manage, distribute use store and revoke digital certificates. In this case will be using PKI cards, which will allow entrance into the facility, it will also allow entrance into specific areas of the building, allow employees to clock in and out and will allow for signing off and on of company computers. All employees will be issued a card with their name employee ID and photo on the face the card on the backside of the card will be company contact information such as departmental phone numbers, etc. the implementation of a company encryption strategy is extremely important to protect the company. The company’s clients and the overall day-to-day activities, the employees involved themselves in to keep the company running.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    Aii. Explain why it is important to have secure systems for recording and storing information in a…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Aes Encrypt

    • 1445 Words
    • 6 Pages

    private key symmetric block cipher 128-bit data, 128/192/256-bit keys stronger & faster than Triple-DES active life of 20-30 years (+ archival use) provide full specification & design details both C & Java implementations NIST have released all submissions & unclassified analyses…

    • 1445 Words
    • 6 Pages
    Good Essays