logo

Encryption Symmetric Key Encryption

9 Pages2853 Words351 Views
   

Added on  2020-02-24

About This Document

Information Security Technologies Name Date 1 Topic 3: Encryption3 Topic 4: Secure Networks4 Topic 5: Access Control 5 Topic 6: Firewalls 7 References 9 Topic 3: Encryption Symmetric key encryption This is a cryptography approach in which the message sender and the receiver share a common single key used for encrypting and decrypting a message. The created hashher text is then sent by the sender as a message to the recipient and the receiver then decrypts the sent encrypted message into plain text using the shared key.

Encryption Symmetric Key Encryption

   Added on 2020-02-24

ShareRelated Documents
Running head: INFORMATION SECURITY TECHNOLOGIES 1Information Security TechnologiesNameDate
Encryption Symmetric Key Encryption_1
Running head: INFORMATION SECURITY TECHNOLOGIES 2Table of Contents..............................................................................................................................................................1Topic 3: Encryption.............................................................................................................................3Topic 4: Secure Networks....................................................................................................................4Topic 5: Access Control.......................................................................................................................5Topic 6: Firewalls................................................................................................................................7References............................................................................................................................................9
Encryption Symmetric Key Encryption_2
Running head: INFORMATION SECURITY TECHNOLOGIES 3Topic 3: Encryption Symmetric key encryptionThis is a cryptography approach in which the message sender and the receiver share a common single key used for encrypting and decrypting a message. It uses algorithms where similar cryptographic keys are used for both plain text message encryption and cipher-text message decryption. As such, the key is a secret that is shared between the sender and the receiver. Symmetric encryption is used to ensure confidentiality; it helps keep messages secret and unable to be intercepted and decrypted before they reach their destination. The process starts with a sender creating a cipher text through encryption of plain text message using a symmetric encrypting algorithm as well as a shared key. The created cypher text is then sent by the sender as a message to the recipient and the receiver then decrypts the sent encrypted message into plain text using the shared key. There are two parties involved, and only these two parties have the key for the encrypted data and information. The space of a key doubles every time a bit is added to it, meaning that longerkeys are much better than shorter keys in ensuring security and confidentiality. Since, for example, people use patterns they can remember to generate passwords, attackers can build dictionaries of passwords that are regularly used for launching attacks (Sikorski, Honig & Bejtlich, 2012). The symmetric key that is encrypted can be changed at every instance, creating a session, but changing the keys at every session means an attacker cannot decrypt each and every new session key, thereby enhancing security. There are various symmetric encryption algorithms in use and include Rijndael and Triple DES; they are designed to perform efficiently on common hardware architectures. Symmetric is very simple in nature due to the sharing of the secret key between the sender and recipient. Public key encryptionThis is the opposite of symmetrical key encryption is is usually termed as asymmetric key encryption where both private and public keys are utilized in data/ message encryption and decryption. It entails using large numbers that are paired together, although the numbers are dissimilar. In the pair, one key is shared with anyone and makes up the public key. However, the other key remains secret and is thus the private key. In public encryption, the strength of the public key encryption system is based on the degree of computational difficulty for a key that is propery generated properly to be established from the corresponding public key. Security then becomes dependent only on ensuring the private key remains private; the public key can be published without any compromises to security. Either the private or public key can be used for message
Encryption Symmetric Key Encryption_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hybrid Encryption
|4
|798
|8

Cryptography and System Security .
|7
|1528
|232

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

CSI2102 - Information Security Technologies | Case Study
|14
|3537
|42

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Security in Information Technology | Assignments
|13
|3545
|119