Data Encryption Techniques: A Presentation for MITS5004 IT Security

Verified

Added on  2022/10/19

|11
|600
|182
Presentation
AI Summary
This presentation provides an overview of data encryption techniques, focusing on three key algorithms: Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Rivest Shamir Adleman (RSA). The presentation analyzes an academic paper that discusses these algorithms, highlighting their significance in maintaining data security within network servers. It explores the implementation of AES, DES, and RSA, discussing their strengths and weaknesses in terms of key size, algorithm types, and hardware/software implementation. The presentation concludes that the appropriate selection of these algorithms is crucial for securing data within network systems, particularly in today's data-driven world. References to the original research paper and related studies are included to support the analysis.
Document Page
Presentation on Data
Encryption Techniques
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
The technology of encryption
technique is depicted as one of the
important methodology associated
with the maintenance of the data
security within the overall network
server. This presentation will
provide an effective overview in
respect to the article that deals with
three types of data encryption
methodology [1].
Document Page
ARTICLE ANALYSIS
The significant article that is taken
in consideration for the analysis of
the different types of data
encryption methodologies is
identified as “P. Mahajan and A.
Sachdeva, A study of encryption
algorithms AES, DES and RSA for
security. Global Journal of Computer
Science and Technology, 2013.”
Document Page
AES
The concept of Advanced
Encryption Standard is identified as
the security algorithm that deals
with the overall management of the
data in terms of the security
associated with these data [2]. This
methodology is identified to amplify
the implementation of the hardware
as well as software in respect to the
data security. The algorithm is
provided in the figure aside.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DES
The concept of Data Encryption
Standard is the next encryption
technique highlighted within the
article. The data that are secured
with this technique is stated as the
sensitive unclassified as well as
commercial data [4]. The picture
aside depicts the overall flow of the
algorithm.
Document Page
RSA
The concept of Rivest Shamir
Adleman is the oldest type of
encryption technique highlighted
within the article. This algorithm
tends to follow the three effective
steps such as Key Generation,
Encryption as well as Decryption
[3].
Document Page
Discussion of Result
The overall result that is analyzed
with respect to the article is that the
encryption techniques are very
significant in maintaining the
security of the data associated with
the network servers. Moreover the
data encryption techniques are
found important in the modern day
world in which the data are mostly
present within the network systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Discussion of Result
The result also analyses the fact
that the significant algorithms
described are mostly important. But
the usage of the most significant
algorithm is also necessary to
choose from the stated algorithms.
The differences are highlighted in
respect to the key size, the kinds of
algorithm followed as well as the
implementation on the hardware as
well as the software.
Document Page
Conclusion
The overall conclusion in respect to
this techniques that can be adhered
is depicted that the usage of the
significant algorithms helps the
security of the data associated with
the whole network systems.
Document Page
[1] P. Mahajan and A. Sachdeva, A study of encryption
algorithms AES, DES and RSA for security. Global Journal
of Computer Science and Technology, 2013.
[2] P. Patil, P. Narayankar, D.G. Narayan and S.M. Meena,
A comprehensive evaluation of cryptographic algorithms:
DES, 3DES, AES, RSA and Blowfish. Procedia Computer
Science, 78, pp.617-624, 2016.
[3] V.R. Pancholi and B.P. Patel, Enhancement of cloud
computing security with secure data storage using AES.
International Journal for Innovative Research in Science
and Technology, 2(9), pp.18-21, 2016.
[4] S.D. Rihan, A. Khalid and S.E.F. Osman, A performance
comparison of encryption algorithms AES and DES.
International Journal of Engineering Research &
Technology (IJERT), 4(12), pp.151-154, 2015.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]