Question

In: Accounting

Discuss how different types of encryption systems work, and explain how digital signatures provide the means...

Discuss how different types of encryption systems work, and explain how digital signatures provide the means for creating legally-enforceable contracts.

Solutions

Expert Solution

There are four encryption methods on the basis of keys used, key length, and size of data blocks encrypted.

1. Advanced Encryption Standard (AES)

Advanced Encryption Standard is a symmetric encryption algorithm that encrypts fixed blocks of data (of 128 bits) at a time. The keys used to decipher the text can be 128-, 192-, or 256-bit long. The 256-bit key encrypts the data in 14 rounds, the 192-bit key in 12 rounds, and the 128-bit key in 10 rounds. Each round consists of several steps of substitution, transposition, mixing of plaintext, and more. AES encryption standards are the most commonly used encryption methods today, both for data at rest and data in transit.

2. Rivest-Shamir-Adleman (RSA)

Rivest-Shamir-Adleman is an asymmetric encryption algorithm that is based on the factorization of the product of two large prime numbers. Only someone with the knowledge of these numbers will be able to decode the message successfully. RSA is often used in digital signatures but works slower when large volumes of data need to be encrypted.

3. Triple Data Encryption Standard (TripleDES)

Triple Data Encryption Standard is a symmetric encryption and an advanced form of the DES method that encrypts blocks of data using a 56-bit key. TripleDES applies the DES cipher algorithm three times to each data block. TripleDES is commonly used to encrypt ATM PINs and UNIX passwords.

4. Twofish

Twofish is a license-free encryption method that ciphers data blocks of 128 bits. It’s considered the successor to the Blowfish encryption method that ciphered message blocks of 64 bits. Twofish always encrypts data in 16 rounds regardless of the key size. Though it works slower than AES, the Twofish encryption method continues to be used by many file and folder encryption software solution.

how digital signatures provide the means for creating legally-enforceable contracts.:

The E-Sign Act states that signatures should not be denied legal validity solely because they are electronic, which means that a contract that is signed electronically can be brought into trial. However, a judge’s willingness to accept that contract will depend on how the electronic document was signed.


Related Solutions

How has the protocol behind Digital Signatures changed in the last 20 years? Briefly discuss the...
How has the protocol behind Digital Signatures changed in the last 20 years? Briefly discuss the history and background of this issue, and the current and future impact on the Network Security and Cryptography field.
Explain different types of car suspension systems.
Explain different types of car suspension systems.
Identify the four different types of wireless encryption, and indicate which ones provide the best security....
Identify the four different types of wireless encryption, and indicate which ones provide the best security. Provide a brief explanation of each.
What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.
What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.
In service organisations different costing systems may be appropriate for different types of services. Provide an...
In service organisations different costing systems may be appropriate for different types of services. Provide an example of a service organisation that may be suited to each of the following costing systems, and in each case, explain your choice: i) job costing ii) process costing iii) some form of hybrid costing
Explain how knowledge work systems provide value for a firm. Why do you think knowledge work...
Explain how knowledge work systems provide value for a firm. Why do you think knowledge work systems are important today? Discuss how CAD, virtual reality, and augmented reality are used today. What has been your experience with these three tools? Are there similar technologies to CAD, VR, and AR that you see on the horizon that will benefit firms in the future?
What is digital evidence? Explain the types of evidence. What is digital evidence? Explain the types...
What is digital evidence? Explain the types of evidence. What is digital evidence? Explain the types of evidence.
Management accounting and financial accounting provide different information for different purposes. Explain what this means and...
Management accounting and financial accounting provide different information for different purposes. Explain what this means and provide an example that illustrates the differences between management and financial accounting.
6. Explain the process of translation. How do the different types of RNA work together? 7....
6. Explain the process of translation. How do the different types of RNA work together? 7. What is a codon? 8. How does a ribosome know where to start and stop translation?
Why do different organizations use different inventory valuation systems? Provide examples of which types of organizations...
Why do different organizations use different inventory valuation systems? Provide examples of which types of organizations are best suited for valuation approach. Explain your choices.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT