100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 32: Networked Systems Security { D2 }

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
02-03-2021
Written in
2020/2021

D2 compare the security benefits of different cryptography techniques.









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
March 2, 2021
Number of pages
3
Written in
2020/2021
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

D2 Compare the security benefits of different cryptography techniques.

Asymmetric Cryptography
There are two types of asymmetric cryptography that are used in computing to improve performance
and security. These fundamentals will help you deploy encryption later on and improve your
understanding of how certificates work. Encryption is an important part of computing in order to
keep
your files secure and have secure communication. Encryption is the process of taking data and
encoding it into a form that cannot be read by unauthorized people. There are two types of
encryption schemes that are used. These are symmetric key and public key encryption.

Symmetric key encryption
Symmetric key encryption uses the same key to encrypt data as to decrypt data. This generally makes
it faster than public key encryption. The problem with this method of encryption is in order for data
to be decrypted, the key must be available. This causes two problems which are the key needs to
stored securely. If an attacker were to gain access to this key they could decrypt any data that key
was used to encrypt. It is common for Symmetric keys to be stored in a safe place and only accessed
when required. The next problem is if another party needs to decrypt the information. In order for
this to occur, a secure channel needs to be used to transfer the key. For example, a common practice
is for the key to be transferred using the telephone.

Private/public key encryption
Public key encryption uses two keys, a public and private key. To illustrate, imagine that two people
want to communicate with each other. In between them is a 3th party that is trying to eavesdrop on
their conversation. With traditional encryption that uses the same key, the problem is getting the key
to the second party without the 3rd party obtaining the key. With public key encryption, the public
key is required to encrypt traffic however it does not need to be secured. If a 3rd party was to obtain
the public key, they would not be able to decrypt any data that was encrypted using it. In order to
decrypt the data, you require a private key. The private key does need to be stored Securely, but the
advantage is the encryption can occur without the private key. This means the private key never
needs to be transferred and thus there is no chance that it can be intercepted by a 3rd party.

Symmetric Cryptography
A symmetric cryptography key algorithm is an encryption system that use same cryptographic keys
for decryption of ciphertext and encryption of plaintext. The receiver and sender of the message
shares a common and single key that is used decrypt and encrypt the message as the key can be a
word, string of characters or number. The key algorithm applies to a message to make the content
unreadable by reversing the words that is written in backwards and the passwords acts when the
receiver and sender decrypt to read the message. Symmetric cryptography key algorithm is fast and
simple but has the disadvantage such as the receiver have to share the key that could decrypt the
messages.

DES
DES stands for Data Encryption Standard, it is a symmetric key algorithm that encrypt the digital
data. The DES was originally developed in 1975 and was taken by the USNBOS as the United States
government standard for encrypting important information and data. DES uses 56-bit keys symmetric
cipher. It uses cipher block method to convert cipher text into plain text with a size of 64 bits that
uses symmetric key, although 8 bits are used to detect errors of the effectiveness of the DES which is
actually 56 bits and it is considered weak because of the advances in computer processing.




Jessreen Sandhu

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jessykaur Staffordshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
31
Member since
4 year
Number of followers
23
Documents
36
Last sold
1 year ago

2.3

12 reviews

5
2
4
0
3
2
2
3
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions