100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 32: Networked Systems Security { D2 } £4.99
Add to cart

Essay

Unit 32: Networked Systems Security { D2 }

 106 views  0 purchase

D2 compare the security benefits of different cryptography techniques.

Preview 1 out of 3  pages

  • March 2, 2021
  • 3
  • 2020/2021
  • Essay
  • Unknown
  • A+
All documents for this subject (7)
avatar-seller
jessykaur
D2 Compare the security benefits of different cryptography techniques.

Asymmetric Cryptography
There are two types of asymmetric cryptography that are used in computing to improve performance
and security. These fundamentals will help you deploy encryption later on and improve your
understanding of how certificates work. Encryption is an important part of computing in order to
keep
your files secure and have secure communication. Encryption is the process of taking data and
encoding it into a form that cannot be read by unauthorized people. There are two types of
encryption schemes that are used. These are symmetric key and public key encryption.

Symmetric key encryption
Symmetric key encryption uses the same key to encrypt data as to decrypt data. This generally makes
it faster than public key encryption. The problem with this method of encryption is in order for data
to be decrypted, the key must be available. This causes two problems which are the key needs to
stored securely. If an attacker were to gain access to this key they could decrypt any data that key
was used to encrypt. It is common for Symmetric keys to be stored in a safe place and only accessed
when required. The next problem is if another party needs to decrypt the information. In order for
this to occur, a secure channel needs to be used to transfer the key. For example, a common practice
is for the key to be transferred using the telephone.

Private/public key encryption
Public key encryption uses two keys, a public and private key. To illustrate, imagine that two people
want to communicate with each other. In between them is a 3th party that is trying to eavesdrop on
their conversation. With traditional encryption that uses the same key, the problem is getting the key
to the second party without the 3rd party obtaining the key. With public key encryption, the public
key is required to encrypt traffic however it does not need to be secured. If a 3rd party was to obtain
the public key, they would not be able to decrypt any data that was encrypted using it. In order to
decrypt the data, you require a private key. The private key does need to be stored Securely, but the
advantage is the encryption can occur without the private key. This means the private key never
needs to be transferred and thus there is no chance that it can be intercepted by a 3rd party.

Symmetric Cryptography
A symmetric cryptography key algorithm is an encryption system that use same cryptographic keys
for decryption of ciphertext and encryption of plaintext. The receiver and sender of the message
shares a common and single key that is used decrypt and encrypt the message as the key can be a
word, string of characters or number. The key algorithm applies to a message to make the content
unreadable by reversing the words that is written in backwards and the passwords acts when the
receiver and sender decrypt to read the message. Symmetric cryptography key algorithm is fast and
simple but has the disadvantage such as the receiver have to share the key that could decrypt the
messages.

DES
DES stands for Data Encryption Standard, it is a symmetric key algorithm that encrypt the digital
data. The DES was originally developed in 1975 and was taken by the USNBOS as the United States
government standard for encrypting important information and data. DES uses 56-bit keys symmetric
cipher. It uses cipher block method to convert cipher text into plain text with a size of 64 bits that
uses symmetric key, although 8 bits are used to detect errors of the effectiveness of the DES which is
actually 56 bits and it is considered weak because of the advances in computer processing.




Jessreen Sandhu

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £4.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50064 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£4.99
  • (0)
Add to cart
Added