Preview

Nt1310 Unit 7 Exercise 1

Powerful Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Exercise 1
1. Triple DES

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.
2. RSA

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the
…show more content…
Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. It’s definitely one of the more flexible encryption methods available.
4. Twofish

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.
5. AES

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 6 Exercise 1

    • 419 Words
    • 2 Pages

    On a TWISTED PAIR CABLE I chose to install an RJ-45. This is the standard Ethernet connector for most systems used today. I would first measure out the length of cable that I would need. I would then use a wire cutter to cut the length that I need, leaving enough room for corrections and to open the wire. I would then use wire strippers to remove a small piece of the outer most jacket. I would then choose what connection I wanted to make (568A or 568B). I would then untwist the wires and put them in the correct color order that I need. Then I would flatten out the wires and in one hand hold my RJ-45 connector and then with the other hand feed the wires into the connector. This is usually pretty simple with the way the connectors are made, and they are also usually clear. After I’m sure that the wires are in the connector all the way, and in the right order, I would use a wire crimper to clamp the wires securely into the connector.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Exercise 1

    • 322 Words
    • 2 Pages

    1. List the patients that you took care of this week (one initial only); their age; gender; and primary diagnosis.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    In 1976, after voicing their disapproval of DES and the difficulty in handling secret keys, Whitfield Diffie and Martin Hellman published the Diffie-Hellman algorithm for key exchange. This was the first published use of public key cryptography, and arguably one of the cryptography field’s greatest advances…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Accounting

    • 7868 Words
    • 32 Pages

    Encryption is the primary method of achieving confidentiality in e-commerce. Plain-text messages are rearranged by some mathematical process. The encrypted message cannot be read by anyone who does not know the process.…

    • 7868 Words
    • 32 Pages
    Good Essays
  • Better Essays

    * The RSA scheme is a block cipher in which the plain text and cipher text are integers between 0 and n-1 for some n.…

    • 1928 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3x56 = 186 bits a triple encryption with two keys maybe used.…

    • 875 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    The Setup algorithm takes as input the depth of the key structure supported and generates a master key and a public key for the scheme. KeyGen takes the master-key generated by the setup, a user’s identity and an attribute set as input, and produces a secret key for the user. Encrypt algorithm takes as input the public key of the scheme, along with a message and an access tree, and generates a ciphertext as output. Finally, Decrypt takes a ciphertext and a secret-key (produced by KeyGen), and if the access-tree used to construct the ciphertext is satisfied by the attribute set for which the secret-key was generated, then it recovers the message from the ciphertext. Each of these algorithms are explained in detail…

    • 1837 Words
    • 8 Pages
    Better Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The key size of DES is 56 bit which is comparatively smaller than AES which has 128,192, or 256-bit secret key.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security

    • 3919 Words
    • 16 Pages

    • A “hash” is a short function of a message, f ti f sometimes called a “message digest” g g • BUT: a hash is not uniquely reversible • Many messages have the same hash…

    • 3919 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Data Encryption Standard

    • 2617 Words
    • 11 Pages

    Bibliography: [1] Data Encryption Standard, Federal Information Processing Standards Publication (FIPS PUB) 46, National Bureau of Standards, Washington, DC (1977). [2] Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York.…

    • 2617 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.…

    • 2454 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Emery Jou received the B.S degree in physics from Tsing Hua University, Hsinchu, Taiwan, the M.S. degree in computer science from the University of Texas at Austin, and the Ph.D. degree in computer science from the University of Maryland, College Park. He is currently a Research Scientist with the Institute for Information Industry, Taipei, Taiwan. He was with several Wall Street firms in the United States for more than 12 years (i.e., Morgan Stanley and JPMorganChase) as a System Architect for Security Transaction Processing through Single Sign-on and Public Key Infrastructure. He was also with Thales nCipher, Cambridge, U.K., where he was engaged in Tape Storage Data Encryption and Key Management Systems. In 2009, he was a Visiting Professor with the College of Computer Science, National Chiao Tung University, Hsinchu. He was also a consultant for the Industrial Technology Research Institute, Hsinchu.…

    • 8550 Words
    • 35 Pages
    Powerful Essays