logo

Cryptography Algorithm

   

Added on  2022-12-30

11 Pages2443 Words35 Views
Running head: CRYPTOGRAPHY ALGORITHM
CRYPTOGRAPHY ALGORITHM
Name of the Student
Name of the University
Author Note

CRYPTOGRAPHY ALGORITHM
Table of Contents
Answer to Task 1.1:...................................................................................................................2
Answer to 1.2:............................................................................................................................3
Cloud Computing Security with Secure Data Storage using AES:........................................3
Security in National Security agency by DES:......................................................................3
Network security by RSA:.....................................................................................................4
Answer to 2.1:............................................................................................................................4
Mobile Devices (BYOD).......................................................................................................4
Unpatched or Unpatchable Devices:......................................................................................5
Answer to question 2.2:..........................................................................................................6
References..................................................................................................................................8

CRYPTOGRAPHY ALGORITHM
Answer to Task 1.1:
There have been three identified primary types cryptographic algorithms that are
currently used in the latest business structures and common use for providing the adequate
security to the software and networks (Mahajan and Sachdeva 2013). These are identified as
the symmetric, asymmetric and the hashing algorithms. Following would be a brief
description of the three algorithms that would provide the proper security to the software and
the networks:
Symmetric Encryption algorithms: This algorithm structure is generally referred to
as the shared key encryption which is also known as the secret key encryption where a single
key is been utilized for both the purposes of encrypting and decrypting the network traffic.
There encryption algorithms available of various types or kinds which are also included in the
symmetric encryption algorithms, like the DES, 3DES, RC4 and AES (Tayde and Siledar
2015). Amongst these, the 3DES and the AES algorithms are mostly used in the IPsec
networks and other types of Virtual Private Networks. The other algorithms like RC4 us used
in wireless networks mostly where the base encryptions lie with the utility of the WPA
version 1 and WEP.
Asymmetric encryption algorithm: This encryption algorithm is can be known as
the Public-Key cryptography also. This cryptography algorithm is known to use various keys
for the various kinds of activity and procedures of encryption and decryption processs. This is
the most important variation between the symmetric and asymmetric cryptography encryption
algorithms (Singh 2013). There is one of the most very commonly used asymmetric
encryption algorithm which is identified to be and known as the RSA. On the contrary to the
simple structure of symmetric key algorithms, the asymmetric encryption algorithm has a

CRYPTOGRAPHY ALGORITHM
burden of high computational imposition. This is why, this algorithm is not used much when
it comes to the protection of the payload data.
Hashing algorithm:Hashing is a type of the cryptographic security algorithm that is a
two-step procedure which first encrypts a message then decrypts it as well. The condensing
of the hash encryption algorithms helps in the turning of the procedure in an irreversible fixed
length value, which is referred to as hash. MD5 and SHA-1 is two of the most frequently
utilized hashing algorithms that have been identified.
Answer to 1.2:
Cloud Computing Security with Secure Data Storage using AES:
Cloud Computing is a collection of IT services supplied to a client through a network
and delivered by an infrastructure owned third party supplier. It is usually delivered "as a
service" over the web, usually as a service infrastructure (IaaS), as a service platform known
as the Platform as a Service (PaaS) and as a service software (SaaS) (Pancholi and Patel
2016). The wider notion of infrastructure convergence is cloud computing. This sort of data
centre setting enables companies to operate more fast, manageable and maintenance-free apps
to satisfy company needs. For example, all smart phones and tablets apps can be managed
and stored on one site, i.e. the nube. So, at our end we don't need any memory room. This
also provides safety in the event of damage or loss of device.
Security in National Security agency by DES:
The message block is encrypted in 16 phases or rounds. Seventeen 48-bit keys,
another each round is produced from the input key. Eight S-boxes are used in each round.
The S-boxes are specified in the normal specification. Six-bit clusters are mapped into four-
bit groups via the S-boxes. The properties of these S-boxes were calculated by the United

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security
|5
|775
|62

Principles and Methods in Cryptographic Security | PPT
|12
|646
|11

Wireless Networking | Assignment
|9
|1836
|43

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Wireless Networking Concepts: Assignment (Doc)
|7
|1115
|120

Network and Security Assignment PDF
|26
|2127
|51