REPLY 1 Question A What are three common encryption ciphers

  

REPLY 1

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                  CLASSMATE’S DISCUSSION

Question A

The three common encryption ciphers used to protect network communications are monoalphabetic, polyalphabetic, and transposition cipher. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters, (White, 2016). This type of cipher is simple. However, there is a disadvantage of the frequency of the substituting. The polyalphabetic substitution-based cipher is similar to the mono alphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string, (White, 2016). This type of cipher is better because it prevents a frequency analysis or algorithms from decoding easily. A transposition-based cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved, (White, 2016). With the transposition cipher the character is moved but not changed.

Reference:

White, C. (2016). Data Communications and Computer Networks: A Business User’s Approach

(Independence, KY: Cengage Learnings ISBN: 9781305729902 8th ed.). 

Question B

Data encrypted with the public key can be decoded only with the public key, and data encrypted with the private key can be decoded only with the public key, (White, C. 2016). Public key cryptography provides protection to network data when one person or organization has either a key to code or decode. One end will have the public key that encrypts, and the other private key will decode the ciphertext.

Reply 2

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                   CLASSMATE’S DISCUSSION

Question A

Question A – Triple DES, AES ad RSA are the most common encryption ciphers.

Triple DES was a recommended encryption standard and at one point, used to be one of the most used symmetric algorithm in the industry. Triple DES uses three keys that are 56 bits each. Although total key length is supposed to be 168 bits, some argue they are 112 bits in strength. 

AES is the algorithm standard used by the US government and a good number of companies and organizations. AES comes in 128, 192, and 256 ciphers. AES is one of the most resilient encryption ciphers in the market today.

RSA is a public key encryption algorithm and the standard encryption for data sent over the internet. Those familiar with PGP will know that RSA is one of the encryption methods used in the program. This encryption algorithm is asymmetric, requiring a public key to encrypt the message and a private key to decrypt it.

Question B

Public cryptography works on the principle of using two keys, a public key and a private key to protect the data. The user of the technology receives a public/private key pair from a certified authority. When data is sent to other users, they have access to the public key from the sender, which has been used to encrypt the data. When the message arrives at its destination, the recipient can then use its private key to decrypt the message.

The major elements that support this system are the public/private key pairs, the certifying authority and the principle of public keys, which eliminates the need for users to exchange their private keys. 

Reference:

– Lord, N. (2018). A definition of public cryptography. Retrieved Jun 22, 2022 from  https://digitalguardian.com/blog/what-public-key-cryptography

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

This can be about a specific author, a work of

  This can be about a specific author, a work of prose, a concept, or poetry. It will include preliminary research (citations, references) The following are some ideas you can use or you can go on your own: Selected poems from an author (Shakespeare, Langston Hughes, Haiku’s by Basho, etc)

Summary: Herrendorf and Rogerson (2013) – “Growth and Structural

Herrendorf and Rogerson (2013) – “Growth and Structural Transformation” (sections 1 and 2 only) in general terms, the summary must include the main ideas exposed in the paper and some comments on the results. Students should discuss in details the following topics: 1) What is the causal question the paper

Week 7 Assignment – Management at a Company Overview For

Week 7 Assignment – Management at a Company Overview For this assignment, you will explore the role a manager has in change management and decision making. To start, choose one of the following companies: Southwest Airlines. Walmart. Apple. Use Basic Search: Strayer University Online Library and the Internet to research

In a two-page paper, identify the physics principles contained within

  In a two-page paper, identify the physics principles contained within the following scenario. Explain how these principals connect to Einstein’s theory of relativity or in modern applications in physics. If you use a GPS option on your car or a mobile device, you are using Einstein’s theory of relativity.

Goal: Conduct a critical appraisal of literature that demonstrates an

Goal: Conduct a critical appraisal of literature that demonstrates an understanding of quantitative research. Using Chapter 18 Table 18-1 Summary of Major Content Sections of a Research Report and Related Critical Appraisal Guidelines, write a critique of a quantitative research article that you have read related to your clinical practice.

Describe the four primary goals of psychology. Of the four

Describe the four primary goals of psychology. Of the four primary goals which would be the easiest to accomplish? Why? Which would be the most difficult? Why? (Response should be no less than 150 words in length and information from our textbook should be used to support the responses.  Citations

Pillsbury Cookie Challenge

Respond to the following questions in a maximum of four pages, following this format guide: 12 pt font with a ‘normal’ font such as Times New Roman 1.5′ line spacing default margins No title page Name/A# in the document header Page numbers in the footer References in APA format, reference

Research Proposal Draft By the due date assigned, write a 1-page paper addressing the sections below of the research proposal. Methodology Data Analysis

Research Proposal Draft By the due date assigned, write a 1-page paper addressing the sections below of the research proposal. Methodology Data Analysis Plans Describe the plan for data analysis for demographic variables (descriptive statistical tests). Describe a plan for data analysis of study variables (descriptive and inferential  statistical tests)

Using the concepts of convergence, divergence and crossvergence.

Description Question Using the concepts of convergence, divergence and crossvergence, explore how Starbucks can innovate through combining ‘global knowledge’ with ‘local needs’. Explain the concepts of convergence and divergence and back up your points with appropriate evidence from the case study Then explore the tensions between global knowledge and local

Reaching your potential is a process that occurs in stages.

Reaching your potential is a process that occurs in stages. Identify and explain the five stages in the process of reaching your potential. Define values and beliefs and provide personal examples of each. Identify one of your top values and discuss (a) how you think about it; (b) how you

Scenario You are the director of community affairs for the

  Scenario You are the director of community affairs for the health lobby organization, Pathways to a Healthy America. In 2010, President Barack Obama signed the Affordable Care Act into law. As a result, millions of Americans who were previously uninsured gained access to the healthcare system. One of the

In at least 600 words, analyze the song’s lyrics and

  In at least 600 words, analyze the song’s lyrics and images to help the reader make the connection between the song and the need for civic engagement. Use the assigned course reading materials to support your argument. You can choose your music video or select one of these. Video:  Black

Writers often benefit from having a strong support network where

Writers often benefit from having a strong support network where they can share their work. For this Assignment, you’ll do just that! By sharing a piece of writing from your other class, you’ll gain even more perspective on your work. You can also use this feedback as you continue to

You have identified a problem that employees want to work

You have identified a problem that employees want to work remotely. You are proposing to have a hybrid work environment and discuss the benefits of working from home.  Contains no fewer than 2,500 words; no more than 3,000. Includes a minimum of one original graphic. Clearly identifies the audience and

Some environmental regulations seem to stand alone whereas others act

  Some environmental regulations seem to stand alone whereas others act like add-ons. Research the Clean Water Act (CWA) regulations under Section 402, Section 403, and Section 405. Explain how each of these relates to other types of environmental regulations. How did these relationships come about? Why do you think

Pipelined vs Non-Pipelined Processors

 Directions: It can be helpful to examine in detail how pipelining affects the underlying clock cycle time of the processor. We will assume that the individual stages of the datapath have specific latencies: IF – 250ps ID – 350ps EX – 150ps MEM – 300ps WB – 200ps We’ll assume