Question

In: Computer Science

When encrypting data, we must ensure that both the sender and the receiver are in possession...

When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total)

i. Name each type and briefly explain how they are different?

ii. Name one popular algorithm used for each type of encryption.

iii. A user would like to send a long, encrypted message over an untrusted network. Briefly explain how both types of encryption can be used together to ensure both the message and the encryption key may be sent securely.

Solutions

Expert Solution

Firstly we should know about the encryption ,what is it?

Encryption:

Encryption is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format — called “cipher text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.

What is a key in cryptography?

A cryptographic key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

There are two types of encryption:

  1. symmetric encryption
  2. asymmetric encryption

What is symmertic encryption ?

In symmetric encryption the same key is used for encryption and decryption. It is therefore critical that a secure method is considered to transfer the key between sender and recipient.

What is asymmetric encryption?

Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

The private key is kept secret by the owner and the public key is either shared amongst authorised recipients or made available to the public at large.
Data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. Data can therefore be transferred without the risk of unauthorised or unlawful access to the data.

Note :
The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

(ii)

Triple DES

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

(iii) if   A user would like to send a long, encrypted message over an untrusted network both types of encryption can be used together to ensure both the message and the encryption key may be sent securely with the help of hybrid encryption.

A hybrid encryption scheme is one that blends the convenience of an asymmetric encryption scheme with the effectiveness of a symmetric encryption scheme.Hybrid encryption is achieved through data transfer using unique session keys along with symmetrical encryption. Public key encryption is implemented for random symmetric key encryption. The recipient then uses the public key encryption method to decrypt the symmetric key. Once the symmetric key is recovered, it is then used to decrypt the message.The combination of encryption methods has various advantages. One is that a connection channel is established between two users' sets of equipment. Users then have the ability to communicate through hybrid encryption. Asymmetric encryption can slow down the encryption process, but with the simultaneous use of symmetric encryption, both forms of encryption are enhanced. The result is the added security of the transmittal process along with overall improved system performance.


Related Solutions

Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
A sender wants to transmit 16 frames in data link layer to a receiver, and every...
A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if A) Go-back-3 flow control is used? B) Selective repeat is used? C) Stop-and-wait is used?
Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a...
Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a specific TFTP scenario in which the TFTP receiver of 16.4.2 TFTP States sets a socket timeout interval but never encounters a “hard” timeout – that is, a SocketTimeoutException – and yet must timeout and retransmit. Hint: arrange so the sender regularly times out and retransmits some packet, at an interval less than the receiver’s SocketTimeoutException time, but it is not the packet the receiver...
1.What does Drucker mean when he suggests thatcommunication should be sender and receiver oriented?2.What...
1.What does Drucker mean when he suggests that communication should be sender and receiver oriented?2.What does Drucker mean when he suggests that Management as a social science is always changing?3.Why did business and non-profit leaders in the U.S. avoid using the word, 'management,' during the late 1920's and early 1930's? 
Marketers must ensure they keep the company at the centre of all analysis when carrying out...
Marketers must ensure they keep the company at the centre of all analysis when carrying out an investigation of the macroenvironment and the immediate environment. true-false
When answering the provided questions, you must ensure that your answers address the questions, that your...
When answering the provided questions, you must ensure that your answers address the questions, that your answers have an Australian accounting/financial reporting focus, that your answers are internally consistent, and that the individual components of your answers provide a well-rounded argument that is easy to follow. The Chief Financial Officer (CFO) of Large Mart has been unable to find answers for two accounting problems. He has asked you to investigate the following questions and to write a report (including relevant...
When we are making a claim, we must support that position with sufficient evidence. We can...
When we are making a claim, we must support that position with sufficient evidence. We can find that evidence in journals, articles, experiments, experiences, and more. What is the reason for having sufficient evidence? You want to sway the reader to see the topic from your point of view. In order to do this, you must have convincing, reliable, and credible evidence. Why should your evidence be convincing, reliable, and credible? What might happen if your evidence does not come...
When we collect information for research purposes, we collect raw data. This data is great, but...
When we collect information for research purposes, we collect raw data. This data is great, but doesn't always end up meaning a whole lot until we draw some conclusions, organize it and look for patterns. When we organize it a bit, it then becomes what we can consider information. Information is a lot more useful than raw data. In 200 words Do any of you collect data at work? How can you best take raw data and ensure that it...
When must an insurable interest exist in life insurance? both at the time of death and...
When must an insurable interest exist in life insurance? both at the time of death and at the inception of the policy only at the inception of the policy only at the time the beneficiary is paid only at the time of death
When we are at rest, are both branches of the ANS active at the same time...
When we are at rest, are both branches of the ANS active at the same time with each exhibiting variable degrees of stimulation such that one is more dominant than the other, OR is only one branch of the ANS completely active while the other is completely shut off? Explain.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT