Question

In: Computer Science

How long should a key be used before it is replaced? Search the Internet for information...

How long should a key be used before it is replaced? Search the Internet for information regarding cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms. Write a summary of what you find in regards to the recommended times and figure the average time between all three of your sources. Do you agree with the average time for a hash, symmetric, and asymmetric algorithms? What would you recommend for each? Why? Please make sure it is 150 words.

Solutions

Expert Solution

A cryptographic key is generated through a key management system. It is then stored in a key storage database, and is activated upon creation or can be activated later. The time for which a key is used before it is replaced is called as the life cycle of the cryptographic key or also called as the crypto period of the key. A cryptoperiod is defined as the period during which a key can be utilized. Crypto period is a operational life of a key and is defined by number of factors like the sensitivity of the data or keys to be protected and number of keys to be protected,
length of the key, etc. Even after replacing a key the key is not totally removed but is stored in archives so that is can be retrievable in special cases.

Symmetric key algorithm are those which generate the same key for reciever side and sender's side. In case of symmetric key or symmetric algorithm key the cryptoperiod of the symmetric key is from the beginning of the originator usage period(the period of time key protection is applied to the data) to the end of the recipient usage period(the period of time during which the protected information is processed). It ranges from 1 to 7 days for symmetric keys.

Assymetric key algorithm are those which generate different keys for both sender's side and and a different one for reciever side. Unlike in case of Symmetric key algorithm as there are different keys for both sides their cryptoperiod can be long may bo of the order of several years. As in case of any keys the reliability of the signature is redused with the passage of time. Vulnerability of a key is expected to increase with time. Choosing a larger key size can solve this issue and that is why assymetric keys are considered to must have a longer key size and that is why theri cryptoperiod is larger.

Hash algorithm are cryptographic hash functions that generate a fixed length result ( hash or hash value) from the given input. It maps data of arbitary size to a hash of a fixed size. Firstly hash algorithms were irreversible algorithm but with recent years it changed and hash algorithms were made reversible like MD5. There is no key in hash algorithm because it scrambles plain text to give a unique message digest. So, there is no cryptoperiod.

Types of Symmetric key algorithm are-

===============================

DES and Triple DES

RC algorithm family(RC2 and RC4)

AES(Advance Eencryption Standards)

Types of Assymetric key algorithm-

============================

RSA Asymmetric Encryption Algorithm

ECC Asymmetric Encryption Algorithm

El Gamal and DSA

Types of Hash Key Algorithm-

========================

SHA-1 (Secure Hashing Algorithm)

MD5 & MD4(Message Digest)

CRC32

Yes, I agree with the average tiime for hash, symmetric and asymmetric algorithms.


Related Solutions

Search the Internet for financial information about the company selected. Search the Internet for financial information...
Search the Internet for financial information about the company selected. Search the Internet for financial information about the company selected. on Pfizer Comapany Evaluate the following in a 525-word response: Characteristics of common and preferred stock. How stock markets work. The connection between the value of shares and dividends. Mention the ticker symbol of the company studied, the current price of the stock, and its financial history. Indicate if you would recommend investing in this stock and why. Explain.
Conduct a search on the Internet for a healthcare app that can be used as a...
Conduct a search on the Internet for a healthcare app that can be used as a tool to aid a healthcare provider or medical coder or that provides the opportunity for a person to take more control over their health and wellness. • Name of the app and URL • Description of function(s); including if it is specific to iOS (Apple) or Android phones • Ease of use • Where your personal information is stored (Examples: the Cloud, personal device)...
1 How internet came into existence?? 2 Why internet replaced media?? 2.b it is a good...
1 How internet came into existence?? 2 Why internet replaced media?? 2.b it is a good thing?
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the...
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the National Airspace Plan and the Air Traffic Control system. Summarize, describing how ATC Interoperability can be smoothly integrated and also discuss problems associated with this integration. Some subjects to consider are human factors, low altitude operations safety, noise reduction, UAS traffic management, and UAS wake separation standards for UAS integration into the NAS.
Criminal Civil Research Purpose: To search the internet for case information and then be able to...
Criminal Civil Research Purpose: To search the internet for case information and then be able to compare and contrast between civil and criminal law cases. Outcome: You will be able to apply research rules and techniques using web-based legal research. Look up James Arthur Ray - Arizona motivational speaker -on the internet and briefly state why/how he had both criminal and civil trials demonstrate critical thinking skills to prioritize, anticipate, and analyze problems, and then to evaluate and implement solutions.
Use the internet to find a misleading graph. Key Terms to Search: Misleading Graphs 1. Provide...
Use the internet to find a misleading graph. Key Terms to Search: Misleading Graphs 1. Provide a screenshot of the graph 2. Cite the Source 3. Explain why the graph is misleading Analysis 1. Explain how you would fix the graph so it is not misleading 2. Explain why the creator of the misleading graph would want to create the graph in the first place.
Use the internet to find a data set. Key terms to search: Free Public Data Sets...
Use the internet to find a data set. Key terms to search: Free Public Data Sets and Medical Data Sets. Introduce your Data Set and Cite the Source. Why was this data interesting to you? Calculate measures of central tendency (Mean, Median & Mode) and measures of variation (Range and Standard Deviation) for your data. Write a sentence for each calculation explaining what that value means in context of your data.
Use the internet to find a data set. Key terms to search: Free Public Data Sets...
Use the internet to find a data set. Key terms to search: Free Public Data Sets and Medical Data Sets. Introduce your Data Set and Cite the Source. Why was this data interesting to you? Calculate measures of central tendency (Mean, Median & Mode) and measures of variation (Range and Standard Deviation) for your data. Write a sentence for each calculation explaining what that value means in context of your data.
Search the Internet for data analytic tools and review tools for business use. Consider key features,...
Search the Internet for data analytic tools and review tools for business use. Consider key features, usefulness, and cost. Respond to the following in a minimum of 175 words: What criteria do you think are important in the selection of a data analytic tool? How could data analytic tools help small businesses? How might your selection criteria be different for a medium or large business?  
Using the Internet, search for commercial IDPS systems. Whatclassification systems and descriptions are used, and...
Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can they be used to compare the features and components of each IDPS? Create a comparison spreadsheet to identify the classification systems you find.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT