Description
Hi!,
Here are the requirements:
Paper is on: explaining the major types of encryption methods used in today's day and age and how they are used to secure and protect information.
Write a paper (title page and endnotes are not part of page count) Include at least 3-5 references cited. Use APA format for the paper and citations from Style Guide. Page count should be 5-6 pages (single space) or 10-12 pages (double-space). This paper will be turned in to Turnitin.com so please watch for plagiarism and be sure to cite sources.
I have also attached an outline of the paper to make bit easier
Let me know if you have any other questions!
Thanks :)
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached. Please let me know if you have any questions or need revisions.
Running head: THE MAJOR TYPES OF ENCRYPTION METHODS
The Major Types Of Encryption Methods
Student’s Name
Institution Affiliation
1
MAJOR TYPES OF ENCRYPTION METHODS
2
The Major Types Of Encryption Methods
Encryption is the coding of information in cryptography. The original image of data
known as plaintext is translated in another way called the ciphertext. Ideally, a ciphertext can be
deciphered back into the plaintext and read by approved parties only. The encryption does not
preclude intrusion but refuses a requested interceptor’s intelligible content. For technical
purposes, an encoding method usually uses an algorithm-generated pseudo-random encryption
key. The message can be decrypted without a key, but substantial computing resources and
capabilities are needed for a well-designed encryption scheme. A registered user can easily
decrypt the message from recipients and not an unauthorized user with the originator’s key.
Various types of cryptography have traditionally been used to support encryption. Since then, in
all fields of digital computing, new methods have appeared and become widespread. New
encryption methods guarantee security since the encrypting of modern machines is unreliable.
For this purpose, the paper aims to explain the major types of encryption methods used in
today’s day and age and how they are used to secure and protect information.
The Advanced Encryption Standard (AES) is an asymmetrical array cipher selected by
the United States jurisdiction to secure sensitive data. The Advanced Encryption Standard is
globally introduced to encrypt confidential data in applications and hardware (Abood &
Guirguis, 2018). The information security, internet security, and electronic data protection of the
Government are essential. As a consequence of its growth, the National Institute of Standards
and Technology (NIST) declared the urge for an optional version of the Data Encryption
Standard (DES) that has become vulnerable to attacks by hostile forces in 1997.
NIST claimed that a modern and sophisticated encryption algorithm will be non-ranked
and ought to secure critical state information long into the 11th century. It was meant to be
MAJOR TYPES OF ENCRYPTION METHODS
3
smooth to introduce in software and hardware and provide adequate protection against different
assault tactics in controlled mediums such as smartphones (Abdullah, 2017). The U.S.
Government developed AES by offering additional, optional, unrestricted use of encryption
resources in civic or patented, corporate, or non-commercial systems. Nonetheless, the
regulations provided by the U.S. export control applies in NGO’s using AES.
AES consists of three cipher blocks: AES-256, AES-192, and AES-128. The AES-128
has used a 128-snip stretch for encrypting and decrypting texts. On the other hand, AES-192 has
192- snip and AES-256, a 256-snip arch stretch for encrypting and decrypting messages. Each
cipher decrypts and encrypts 128-snip sets of data using128, 192, and 256-bit cryptographic
keys. Cyphers use the same hidden key to encrypt and decrypt symmetric, often known as a false
key, so that both sender and user have to know the same secret key to use it. In three categories,
the government classes information: privilege, confidentiality, or maximum secrecy (Chai et al.,
2017). Each arch stretches can cover the esoteric and hidden degree. Paramount confidential data
needs a vital length of either 192 or 256-bit.
256-bit keys need extra computing power and can be executed longer. If power is a
problem, especially on a minute appliance, or pattern is a problem, the 128-snip arch is a safer
choice. If power is a problem, if hackers try to enter a device, the lowest point, usually not
encryption, will be hit, regardless of whether it is a 128-snip key or a 256-snip arch (Zhang, Hou
& Ren, 2016). A user needs to guarantee that the program being considered does as they wish to
perform, preserves user information in the manner anticipated, and has no weak points in the
whole process.
The 128-bit keys have ten rounds, the 192-bit keys have 12 rounds, and the 256-bit keys
have 14 rounds. A round comprises multiple processing steps that include input plaintext
MAJOR TYPES OF ENCRYPTION METHODS
4
replacement, transfer, and mixing to translate into the final ciphertext output. The algorithm for
AES encryption specifies many transformations to be carried out on data in an array. The first
transformation is code substitution with a swap desk; the abet conversion changes information
banks, and the third blends piers (Chen & Hu, 2017). A distinct section of the encryption arch
will be added to each column for the last transformation—more keys aids in completing more
rounds.
The array zip capable of controlling 128-snip block, utilizing key sized 128, 192, and
256-bit, must be specified by NIST in the latest AES algorithm (Mohammad et al., 2017). The
following includes additional parameters for the Advanced Encryption Standard algorithm:
Aegis: Competitive algorithms have to be tested in conjunction with other submitted
ciphers to withstand attack. The most significant factor in the competition is security power.
Expenditure: The algorithms are tested on ciphering and reminiscence efficacy published
worldwide, non-exclusive, and royalty-free.
Deployment: The algorithm’s versatility, the appropriateness of software or hardware
enactment, and gross simplification are considered.
Researchers argue that AES is safe when correctly applied. Additionally, they explain
that AES is safe when correctly applied. If an intruder has access to the encoder key, even the
most expansive encryption schemes can be liable (Mushtaq et al., 2017). Corporate protection
needs to use solid pins, security managers, multifactor authentication (MFA), antivirus, and
firewall applications Employees should also be equipped to deter attacks from social
engineering and phishing. If the data is stored in the cloud, for example, workers should know
the cloud position (Abood & Guirguis, 2018). Besides, the collection and management of data
MAJOR TYPES OF ENCRYPTION METHODS
5
need not be grey fields or complexities. More specifically, it should be easy to use the security
tools chosen to ensure that consumers do not need insecure workarounds.
Most researchers argue that attacks have ...