100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Ensayo

Unit 32: Networked Systems Security { D2 }

Puntuación
-
Vendido
-
Páginas
3
Grado
A+
Subido en
02-03-2021
Escrito en
2020/2021

D2 compare the security benefits of different cryptography techniques.

Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
2 de marzo de 2021
Número de páginas
3
Escrito en
2020/2021
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A+

Temas

Vista previa del contenido

D2 Compare the security benefits of different cryptography techniques.

Asymmetric Cryptography
There are two types of asymmetric cryptography that are used in computing to improve performance
and security. These fundamentals will help you deploy encryption later on and improve your
understanding of how certificates work. Encryption is an important part of computing in order to
keep
your files secure and have secure communication. Encryption is the process of taking data and
encoding it into a form that cannot be read by unauthorized people. There are two types of
encryption schemes that are used. These are symmetric key and public key encryption.

Symmetric key encryption
Symmetric key encryption uses the same key to encrypt data as to decrypt data. This generally makes
it faster than public key encryption. The problem with this method of encryption is in order for data
to be decrypted, the key must be available. This causes two problems which are the key needs to
stored securely. If an attacker were to gain access to this key they could decrypt any data that key
was used to encrypt. It is common for Symmetric keys to be stored in a safe place and only accessed
when required. The next problem is if another party needs to decrypt the information. In order for
this to occur, a secure channel needs to be used to transfer the key. For example, a common practice
is for the key to be transferred using the telephone.

Private/public key encryption
Public key encryption uses two keys, a public and private key. To illustrate, imagine that two people
want to communicate with each other. In between them is a 3th party that is trying to eavesdrop on
their conversation. With traditional encryption that uses the same key, the problem is getting the key
to the second party without the 3rd party obtaining the key. With public key encryption, the public
key is required to encrypt traffic however it does not need to be secured. If a 3rd party was to obtain
the public key, they would not be able to decrypt any data that was encrypted using it. In order to
decrypt the data, you require a private key. The private key does need to be stored Securely, but the
advantage is the encryption can occur without the private key. This means the private key never
needs to be transferred and thus there is no chance that it can be intercepted by a 3rd party.

Symmetric Cryptography
A symmetric cryptography key algorithm is an encryption system that use same cryptographic keys
for decryption of ciphertext and encryption of plaintext. The receiver and sender of the message
shares a common and single key that is used decrypt and encrypt the message as the key can be a
word, string of characters or number. The key algorithm applies to a message to make the content
unreadable by reversing the words that is written in backwards and the passwords acts when the
receiver and sender decrypt to read the message. Symmetric cryptography key algorithm is fast and
simple but has the disadvantage such as the receiver have to share the key that could decrypt the
messages.

DES
DES stands for Data Encryption Standard, it is a symmetric key algorithm that encrypt the digital
data. The DES was originally developed in 1975 and was taken by the USNBOS as the United States
government standard for encrypting important information and data. DES uses 56-bit keys symmetric
cipher. It uses cipher block method to convert cipher text into plain text with a size of 64 bits that
uses symmetric key, although 8 bits are used to detect errors of the effectiveness of the DES which is
actually 56 bits and it is considered weak because of the advances in computer processing.




Jessreen Sandhu
$6.88
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
jessykaur Staffordshire University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
31
Miembro desde
4 año
Número de seguidores
23
Documentos
36
Última venta
1 año hace

2.3

12 reseñas

5
2
4
0
3
2
2
3
1
5

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes