Question

In: Economics

explain what an encryption algorithm is and what it can do to provide increased computer security...

explain what an encryption algorithm is and what it can do to provide increased computer security ?

Solutions

Expert Solution

Encrypted algorithm is a mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms.

What it does to increase security ?

encryption protects the data that lives on and between those assets. It’s one of the most powerful ways to keep your data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if it’s encrypted.

How does it work?

Encryption—based on the ancient art of cryptography—uses computers and algorithms to turn plain text into an unreadable, jumbled code. To decrypt that ciphertext into plaintext, you need an encryption key, a series of bits that decode the text. The key is something only you or the intended recipient has in their possession. Computers are capable of breaking encrypted code by guessing an encryption key, but for very sophisticated algorithms like an elliptic curve algorithm, this could take a very, very long time.


Related Solutions

What does the SDLC have to do with Computer Security?
What does the SDLC have to do with Computer Security?
Identify the four different types of wireless encryption, and indicate which ones provide the best security....
Identify the four different types of wireless encryption, and indicate which ones provide the best security. Provide a brief explanation of each.
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with...
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with descritpions.
Explain the benefits a recursive algorithm can provide. Discuss the negative aspects of using recursion.
Explain the benefits a recursive algorithm can provide. Discuss the negative aspects of using recursion.
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss whole disk encryption and its impact on the DF field. What can you do to...
Discuss whole disk encryption and its impact on the DF field. What can you do to counteract WDE?
What is an algorithm? Give 2 examples of algorithms and explain what they do and how...
What is an algorithm? Give 2 examples of algorithms and explain what they do and how they work.
What is an algorithm? Why is it important in the field of computer programming?
What is an algorithm? Why is it important in the field of computer programming?
1) How large are the blocks that get fed through the AES Encryption algorithm? 2) What...
1) How large are the blocks that get fed through the AES Encryption algorithm? 2) What are the three possible key sizes for AES? How many rounds are there for each key size? How large is the keyspace? 3) List five distinct differences between the AES and DES algorithms. 4) List the 16 elements of GF(16) as polynomials. What is 3x^2+6x+1 equal to in GF(16), when the coefficients are reduced appropriately? 5) Use the table on slide 17 of the...
How can increased cyber security have a negative impact on data privacy?
How can increased cyber security have a negative impact on data privacy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT