DePaul University The Major Types Of Encryption Methods Essay

User Generated

Fuvinzk

Other

DePaul University

Description

Hi!,

Here are the requirements:

Paper is on: explaining the major types of encryption methods used in today's day and age and how they are used to secure and protect information.

Write a paper (title page and endnotes are not part of page count) Include at least 3-5 references cited. Use APA format for the paper and citations from Style Guide. Page count should be 5-6 pages (single space) or 10-12 pages (double-space). This paper will be turned in to Turnitin.com so please watch for plagiarism and be sure to cite sources.

I have also attached an outline of the paper to make bit easier

Let me know if you have any other questions!

Thanks :)

Unformatted Attachment Preview

Shivam Rami FULL-SENTENCE OUTLINE FORMAT Specific Purpose: The purpose of this paper is to explain the major types of encryption methods used in today's day and age and how they are used to secure and protect information. Introduction (include in all outlines) I. Attention-Getter: Encryption is used to mask virtually everything in today's day and age. II. Personal Credibility: Whatsapp is something I use on a daily basis, every single message is encrypted in the application. III. Thesis: There are many methods of encryption used today. I believe this is the future to securing information and data. [Transition into body of speech, e.g. Let’s start with... ] Body (include in all outlines) I. First main point: The first method of encryption we will be going over is called AES. A. Subpoint: This is one of the most common ways data is encrypted. 1. Sub-subpoint: It is used for both data in at rest and in transit 2. Sub-subpoint Outlining Rule: No 1 without a 2 a. Sub-sub-subpoint: AES takes plain text and turns it into cyphir text which is made up of random characters. B. Subpoint 1. AES can be used for both hardware and software. 2. It is used in the U.S. and is one of the most secure methods of encryption a. It is a web tool that can be used to both encrypt and decrypt data b. There are different bit sizes used in AES like 128 and 256. [Transition into second main point, e.g. We’ve discussed .... now let’s look at.....] II. Second main point: The second method of encryption we will be talking about is called Rivest-Shamir-Adleman (RSA) encryption A. RSA is an asymmetric encryption algorithm that is based on the factorization of the product of two large prime numbers 1. This type of encryption is usually used for digital signatures and small data. 2. RSA does not work well with a large amount of data a. RSAs are used in ways of communication like email and chats [Transition into third main point, e.g. We’ve discussed .... now let’s look at.....] III. Third main point: The third type of encryption we will be going over is called Triple Data Encryption Standard (TripleDES) A. It is a symmetric encryption type that encrypts blocks of data 1. TripleDES is mainly used in encrypting ATM pins and other sorts of passwords [Transition into conclusion: Make this clear, e.g. In conclusion, to sum up, etc.] I. II. Conclusion In today's day and age there are countless ways to encrypt data like we talked about above. AES, RSA and TripleDES are just a few examples of these. Summary: Virtually everything that has data online is encrypted, and the things that we have not yet implemented this on should be as well for our protections. Clincher: I cannot recommend using encryption enough as a way to protect our data Reference List (USING MLA Format) https://www.getapp.com/resources/common-encryption-methods/
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running head: THE MAJOR TYPES OF ENCRYPTION METHODS

The Major Types Of Encryption Methods
Student’s Name
Institution Affiliation

1

MAJOR TYPES OF ENCRYPTION METHODS

2

The Major Types Of Encryption Methods
Encryption is the coding of information in cryptography. The original image of data
known as plaintext is translated in another way called the ciphertext. Ideally, a ciphertext can be
deciphered back into the plaintext and read by approved parties only. The encryption does not
preclude intrusion but refuses a requested interceptor’s intelligible content. For technical
purposes, an encoding method usually uses an algorithm-generated pseudo-random encryption
key. The message can be decrypted without a key, but substantial computing resources and
capabilities are needed for a well-designed encryption scheme. A registered user can easily
decrypt the message from recipients and not an unauthorized user with the originator’s key.
Various types of cryptography have traditionally been used to support encryption. Since then, in
all fields of digital computing, new methods have appeared and become widespread. New
encryption methods guarantee security since the encrypting of modern machines is unreliable.
For this purpose, the paper aims to explain the major types of encryption methods used in
today’s day and age and how they are used to secure and protect information.
The Advanced Encryption Standard (AES) is an asymmetrical array cipher selected by
the United States jurisdiction to secure sensitive data. The Advanced Encryption Standard is
globally introduced to encrypt confidential data in applications and hardware (Abood &
Guirguis, 2018). The information security, internet security, and electronic data protection of the
Government are essential. As a consequence of its growth, the National Institute of Standards
and Technology (NIST) declared the urge for an optional version of the Data Encryption
Standard (DES) that has become vulnerable to attacks by hostile forces in 1997.
NIST claimed that a modern and sophisticated encryption algorithm will be non-ranked
and ought to secure critical state information long into the 11th century. It was meant to be

MAJOR TYPES OF ENCRYPTION METHODS

3

smooth to introduce in software and hardware and provide adequate protection against different
assault tactics in controlled mediums such as smartphones (Abdullah, 2017). The U.S.
Government developed AES by offering additional, optional, unrestricted use of encryption
resources in civic or patented, corporate, or non-commercial systems. Nonetheless, the
regulations provided by the U.S. export control applies in NGO’s using AES.
AES consists of three cipher blocks: AES-256, AES-192, and AES-128. The AES-128
has used a 128-snip stretch for encrypting and decrypting texts. On the other hand, AES-192 has
192- snip and AES-256, a 256-snip arch stretch for encrypting and decrypting messages. Each
cipher decrypts and encrypts 128-snip sets of data using128, 192, and 256-bit cryptographic
keys. Cyphers use the same hidden key to encrypt and decrypt symmetric, often known as a false
key, so that both sender and user have to know the same secret key to use it. In three categories,
the government classes information: privilege, confidentiality, or maximum secrecy (Chai et al.,
2017). Each arch stretches can cover the esoteric and hidden degree. Paramount confidential data
needs a vital length of either 192 or 256-bit.
256-bit keys need extra computing power and can be executed longer. If power is a
problem, especially on a minute appliance, or pattern is a problem, the 128-snip arch is a safer
choice. If power is a problem, if hackers try to enter a device, the lowest point, usually not
encryption, will be hit, regardless of whether it is a 128-snip key or a 256-snip arch (Zhang, Hou
& Ren, 2016). A user needs to guarantee that the program being considered does as they wish to
perform, preserves user information in the manner anticipated, and has no weak points in the
whole process.
The 128-bit keys have ten rounds, the 192-bit keys have 12 rounds, and the 256-bit keys
have 14 rounds. A round comprises multiple processing steps that include input plaintext

MAJOR TYPES OF ENCRYPTION METHODS

4

replacement, transfer, and mixing to translate into the final ciphertext output. The algorithm for
AES encryption specifies many transformations to be carried out on data in an array. The first
transformation is code substitution with a swap desk; the abet conversion changes information
banks, and the third blends piers (Chen & Hu, 2017). A distinct section of the encryption arch
will be added to each column for the last transformation—more keys aids in completing more
rounds.
The array zip capable of controlling 128-snip block, utilizing key sized 128, 192, and
256-bit, must be specified by NIST in the latest AES algorithm (Mohammad et al., 2017). The
following includes additional parameters for the Advanced Encryption Standard algorithm:
Aegis: Competitive algorithms have to be tested in conjunction with other submitted
ciphers to withstand attack. The most significant factor in the competition is security power.
Expenditure: The algorithms are tested on ciphering and reminiscence efficacy published
worldwide, non-exclusive, and royalty-free.
Deployment: The algorithm’s versatility, the appropriateness of software or hardware
enactment, and gross simplification are considered.
Researchers argue that AES is safe when correctly applied. Additionally, they explain
that AES is safe when correctly applied. If an intruder has access to the encoder key, even the
most expansive encryption schemes can be liable (Mushtaq et al., 2017). Corporate protection
needs to use solid pins, security managers, multifactor authentication (MFA), antivirus, and
firewall applications Employees should also be equipped to deter attacks from social
engineering and phishing. If the data is stored in the cloud, for example, workers should know
the cloud position (Abood & Guirguis, 2018). Besides, the collection and management of data

MAJOR TYPES OF ENCRYPTION METHODS

5

need not be grey fields or complexities. More specifically, it should be easy to use the security
tools chosen to ensure that consumers do not need insecure workarounds.
Most researchers argue that attacks have ...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags