Question

In: Computer Science

(Please use some in text citations and references or works cited please. If you have answered...

(Please use some in text citations and references or works cited please. If you have answered the question before please use a new answer thanks.

a. Search the web for various commercial encryption algorithms. b. Find one that you feel may be “snake oil”. c. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs

Solutions

Expert Solution

In cryptography, encryption is the process of encoding a message in a way that only authorized parties can access it.


a)There are many strong encryption algorithms is in cryptography.

*The Commercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithms spread by the National Security Agency as a replacement for NSA Suite B Cryptography algorithms. It serves as the cryptographic base to protect US National Security Systems data up to the top-secret level, while the NSA decides for a transition to quantum-resistant cryptography. (if you want to know more about CNSA, you can search 'what is CNSA' in a search engine)

The suite includes

* Advanced Encryption Standard with 256-bit keys
* Elliptic-curve Diffie–Hellman
* SHA-2 with 384 bits, Diffie–Hellman key exchange
* RSA.


b)First of all we should know about what is snake oil means in cryptography...? snake oil is any cryptographic method or product considered to be fake or fraudulent. I think this is not a full list of 'snake oil' sign in cryptography. which includes...


*Secret system

The systems will claim to rely on a secret algorithm or device this is categorized as security through obscurity.

*Technobabble
Snake oil salespeople may be used technobabble to sell their products since cryptography is a major subject.

*Unbreakable
Claims of a system being "unbreakable" are always false, and are generally considered a sure sign of snake oil.

*One-time pads
These are a popular cryptographic methods because it is known that one-time pads when implemented correctly, are really unbreakable.

*Unsubstantiated bit claims
The Cryptographic products are often accompanied by claims of using a high number of bits for encryption, apparently referring to the key length used.

c)
Data encryption involves the translation of data into a format such that only the intended persons who have a decryption key, also referred to as a secret key will be able to read it.

The encryption algorithms have been developed to replace the DES (data encryption standard ) where the former plays a very significant role in securing information and computing systems. and The modern encryption tools provide confidentiality properties such as data integrity, data authentication, and non-cancellation features. There are 2 types of Encryption,

*Asymmetric Encryption
In this, the encryption key is published for anyone to use and for encrypting messages. the recipient has access to the decryption key that enables messages to be read. Before that, all encryption schemes were symmetric-key.

*Symmetric Encryption
here, the encryption and decryption keys are the same. here communicating parties must have the same key in order to achieve secure communication.

The strongest algorithms in cryptography are...

*RSA
*Advanced Encryption Standards (AES),
*Twofish encryption algorithm
*Blowfish encryption algorithm
*IDEA encryption algorithm
*MD5 encryption algorithm
*HMAC encryption algorithm

in my opinion, The fundamental services offered by cryptography have enabled the conduct of business over the networks using the computer systems in an extremely efficient and effective manner , and also cryptography tool provides more benefits. That is,
*Confidentiality
*Authentication
*Data integrity
*Non-repudiation

Hope you got the correct answer...

Please like...Thank you!


Related Solutions

In a 400-600 word answer, properly cited with an APA-formatted reference list and in-text citations, please...
In a 400-600 word answer, properly cited with an APA-formatted reference list and in-text citations, please answer the following questions. In addition to the researched facts you present as your answer, you may provide opinions and real-world experiences where appropriate. Shaken to the Core, Scenario: A severe earthquake just occurred in your area. Homes, public services (such as power, water, and trash removal), and many lives have been lost. Full evacuation is not likely. Living conditions in local shelters have...
What is the word length effect? include references and in text citations.
What is the word length effect? include references and in text citations.
Need this answered in long paragraph, with intext citations and references: Discuss one of the four...
Need this answered in long paragraph, with intext citations and references: Discuss one of the four basic rules for understanding results in a research study. Compare clinical significance and statistical significance. Which one is more meaningful when considering applying evidence to your practice? Compare descriptive statistics and inferential statistics in research.
Need this answered in long paragraph, with intext citations and references: Discuss one of the four...
Need this answered in long paragraph, with intext citations and references: Discuss one of the four basic rules for understanding results in a research study. Compare clinical significance and statistical significance. Which one is more meaningful when considering applying evidence to your practice? Compare descriptive statistics and inferential statistics in research.
Mythbuster In a 400-600 word answer, properly cited with an APA-formatted reference list and in-text citations,...
Mythbuster In a 400-600 word answer, properly cited with an APA-formatted reference list and in-text citations, please answer the following questions. In addition to the researched facts you present as your answer, you may provide opinions and real-world experiences where appropriate. Research and determine a controversial topic, myth, or rumor in the field of infectious disease. One example is a rumor that a full cure for HIV has been developed, yet not distributed to the public. Another example includes the...
Using APA guidelines with in-text citations/references. Write an introduction paper one paragraph long with a minimum...
Using APA guidelines with in-text citations/references. Write an introduction paper one paragraph long with a minimum of 10 or more sentences. This is for an essay at the end of the class, of your choosing and i will pick up from here.
Counter Argument for this Post: Please list references and citations Adaptive functioning is defined as the...
Counter Argument for this Post: Please list references and citations Adaptive functioning is defined as the ability to effectively perform ordinary life tasks (Mash & Wolfe,2016). Those with an intellectual disability have limitations when it comes to conceptual, social, and practical skills used every day (Mash & Wolfe, 2016). For example, those with an intellectual disability are unable to live independently or obey laws and societal norms. Just because a person has a low IQ does not mean they are...
Answer the following questions with references and citations. 1. Explain, with the use of examples, when...
Answer the following questions with references and citations. 1. Explain, with the use of examples, when it would be appropriate to use trademarks and copyright to protect a firm’s intellectual property. Other than through the use of patents and copyright, how can a firm prevent its competencies from being imitated? 2. How can late entrants win the innovation race? Please give two examples. 3. Considering the case study, discuss some of the wider strategic reasons why firms may wish to...
This has to have in-text citations and reference for me to like the answer or I...
This has to have in-text citations and reference for me to like the answer or I won't accept it Question: Write 2-3 paragraphs on the Baddeley-Hitch model. You are required to cite a source.&n... write 2-3 paragraphs on the Baddeley-Hitch model. You are required to cite a source. This means you need the in-text citation within your paragraph and the full reference at the end of your paragraphs. Please note that 40% of your grade for this assignment is based...
Write a 200 word essay for Stock Valuation,Use APA format. All references must be cited correctly....
Write a 200 word essay for Stock Valuation,Use APA format. All references must be cited correctly. This should be reflective in nature.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT