Question

In: Economics

explain what an encryption algorithm is and what it can do to provide increased computer security...

explain what an encryption algorithm is and what it can do to provide increased computer security ?

Solutions

Expert Solution

Encrypted algorithm is a mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms.

What it does to increase security ?

encryption protects the data that lives on and between those assets. It’s one of the most powerful ways to keep your data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if it’s encrypted.

How does it work?

Encryption—based on the ancient art of cryptography—uses computers and algorithms to turn plain text into an unreadable, jumbled code. To decrypt that ciphertext into plaintext, you need an encryption key, a series of bits that decode the text. The key is something only you or the intended recipient has in their possession. Computers are capable of breaking encrypted code by guessing an encryption key, but for very sophisticated algorithms like an elliptic curve algorithm, this could take a very, very long time.


Related Solutions

what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with...
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with descritpions.
Identify the four different types of wireless encryption, and indicate which ones provide the best security....
Identify the four different types of wireless encryption, and indicate which ones provide the best security. Provide a brief explanation of each.
Explain the benefits a recursive algorithm can provide. Discuss the negative aspects of using recursion.
Explain the benefits a recursive algorithm can provide. Discuss the negative aspects of using recursion.
Discuss whole disk encryption and its impact on the DF field. What can you do to...
Discuss whole disk encryption and its impact on the DF field. What can you do to counteract WDE?
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
What is an algorithm? Why is it important in the field of computer programming?
What is an algorithm? Why is it important in the field of computer programming?
What is an algorithm? Give 2 examples of algorithms and explain what they do and how...
What is an algorithm? Give 2 examples of algorithms and explain what they do and how they work.
How can increased cyber security have a negative impact on data privacy?
How can increased cyber security have a negative impact on data privacy?
What is The Scenario Approach?    What is a project? What do Encryption and Firewalls mean?...
What is The Scenario Approach?    What is a project? What do Encryption and Firewalls mean? Discuss the role of Business/IT Planning and its major components.
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT