Description
Build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. The attached figure shows two possibilities, both of which follow from the definition of CBC. Which of the two would you choose and why:
- For security?
- For performance?
- The paper must include 2-3 pages of content minimum (does not include cover, abstract or references pages)
- Paper must conform to full APA guidelines to include a cover page, abstract, headers, introduction, body paragraphs with appropriate headings/subheadings, conclusion, and a reference page.
- All sources must be cited and references. Remember, unless the statement is common knowledge, you must cite and reference your sources.
- You must use at least one peer-reviewed source
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Encryption
by HAL Lab
Submission date: 07-Aug-2020 06:23AM (UTC-0400)
Submission ID: 1366914733
File name: Encryption.edited.docx (15.98K)
Word count: 746
Character count: 3895
Encryption
ORIGINALITY REPORT
2
%
SIMILARITY INDEX
2%
0%
2%
INTERNET SOURCES
PUBLICATIONS
STUDENT PAPERS
PRIMARY SOURCES
1
2%
download-soft.ru
Internet Source
Exclude quotes
Off
Exclude bibliography
On
Exclude matches
Off
Running Head: ENCRYPTION
1
Encryption
Name:
Institutional Affiliation:
Date:
ENCRYPTION
2
Table of Contents
Encryption ..................................................................................................................................................... 3
Introduction ................................................................................................................................................... 3
Conclusion .................................................................................................................................................... 4
References ..................................................................................................................................................... 6
3
ENCRYPTION
Encryption
Introduction
When it comes to data security, it is essential to consider the role played by the various
technologies. For instance, encryption has been one of the most common approaches that
continue to be used today to ensure data and systems security. Some diverse approaches and
options can be used to ensure maximum security and safety of the various information systems
today. The effectiveness of each of these methods depends on a variety of factors. The model
used and the systems in the context are some of the primary factors that should be considered
when designing and implementing a given approach. In this case, the main focus is to design a
solution which would help in guaranteeing efficiency as far as the attainment of the ultimate
levels of security is concerned (Lestiawan & Purnama, RDO 2016). Through the analysis of the
options given, it is possible to create a solution based on the effectiveness of each of the options
offered above.
One of the most common approaches that are used in the creation of the ultimate
solutions as far as encryption is concerned is the cipher block chaining frame...