In: Computer Science
(Please use some in text citations and references or works cited please. If you have answered the question before please use a new answer thanks.
a. Search the web for various commercial encryption algorithms. b. Find one that you feel may be “snake oil”. c. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
In cryptography, encryption is the process of encoding a message in a way that only authorized parties can access it.
a)There are many strong encryption algorithms is in
cryptography.
*The Commercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithms spread by the National Security Agency as a replacement for NSA Suite B Cryptography algorithms. It serves as the cryptographic base to protect US National Security Systems data up to the top-secret level, while the NSA decides for a transition to quantum-resistant cryptography. (if you want to know more about CNSA, you can search 'what is CNSA' in a search engine)
The suite includes
* Advanced Encryption Standard with 256-bit keys
* Elliptic-curve Diffie–Hellman
* SHA-2 with 384 bits, Diffie–Hellman key exchange
* RSA.
b)First of all we should know about what is snake oil means in
cryptography...? snake oil is any cryptographic method or product
considered to be fake or fraudulent. I think this is not a full
list of 'snake oil' sign in cryptography. which includes...
*Secret system
The systems will claim to rely on a secret algorithm or device this is categorized as security through obscurity.
*Technobabble
Snake oil salespeople may be used technobabble to sell their
products since cryptography is a major subject.
*Unbreakable
Claims of a system being "unbreakable" are always false, and are
generally considered a sure sign of snake oil.
*One-time pads
These are a popular cryptographic methods because it is known that
one-time pads when implemented correctly, are really
unbreakable.
*Unsubstantiated bit claims
The Cryptographic products are often accompanied by claims of using
a high number of bits for encryption, apparently referring to the
key length used.
c)
Data encryption involves the translation of data into a format such
that only the intended persons who have a decryption key, also
referred to as a secret key will be able to read it.
The encryption algorithms have been developed to replace the DES (data encryption standard ) where the former plays a very significant role in securing information and computing systems. and The modern encryption tools provide confidentiality properties such as data integrity, data authentication, and non-cancellation features. There are 2 types of Encryption,
*Asymmetric Encryption
In this, the encryption key is published for anyone to use and for
encrypting messages. the recipient has access to the decryption key
that enables messages to be read. Before that, all encryption
schemes were symmetric-key.
*Symmetric Encryption
here, the encryption and decryption keys are the same. here
communicating parties must have the same key in order to achieve
secure communication.
The strongest algorithms in cryptography are...
*RSA
*Advanced Encryption Standards (AES),
*Twofish encryption algorithm
*Blowfish encryption algorithm
*IDEA encryption algorithm
*MD5 encryption algorithm
*HMAC encryption algorithm
in my opinion, The fundamental services offered by cryptography
have enabled the conduct of business over the networks using the
computer systems in an extremely efficient and effective manner ,
and also cryptography tool provides more benefits. That is,
*Confidentiality
*Authentication
*Data integrity
*Non-repudiation
Hope you got the correct answer...
Please like...Thank you!