Description
Write 5 pages paper about cryptography and include the following:
• Proper introduction.
• Symmetric Encryption including 3DES and AES protocols.
• Asymmetric Encryption including RSA.
• Hash Digest including MD5 and SHA256.
• Detail explanation of Diffie-Hellman Key Exchange.
• Proper conclusion.
Cite references according to APA style.
Explanation & Answer
Attached.
Running Head: ENCRYPTION
1
Encryption
Institution Affiliation
Date
ENCRYPTION
2
The security of the information and data transmissions from one to end to another is vital
both at a personal level and for the organization. Encryption is the method that ensures that the
data security protection against unauthorized users. This method converts a plaintext into an
encoded that can only be interpreted in a known language by use of a decryption key. This
process enhances the protection of the data across are networks involved in transmission. In
protection of the information in the internet users, which is transmitted between the browser and
the server, encryption is used to ensure the personal information is protected from unauthorized
users. This paper discusses in detail the different categories of the encryption algorithms used
for the protection of the data and other personal information. The benefits that are accrued after
the installation of the distinct encryption mechanisms.
The organization has a responsibility to ensure the data and other information are kept
safe at all time and in all transactions it carries. This ensures the data and information in the
hands of the authorized users is not accessed by attackers. The encryption process ensures the
safety of the data, where it takes in account the plaintext that is intended to be transmitted is
concealed in a form that no hardware or unauthorized user is able to access it; this is achieved by
using an encryption algorithm and a unique encryption key. The encrypted text produced in an
unreadable form that can only be made readable by decryption by a user of an encryption key.
This key is only availed to authorized users, making sure that only the users that are allowed to
read the text can access a data or information. In order to achieve the security of data and
information, different algorithms are used. They include the symmetric and asymmetric
encryption algorithms, which are mostly used today by different entities to secure their data and
their customer’s ...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
The Age of Innocence
by Edith Wharton
Communist Manifesto
by Karl Marx
Dr Jekyll And Mr Hyde
by Robert Louis Stevenson
Breakfast at Tiffanys
by Truman Capote
No Exit
by Taylor Adams
The Curious Case of the Dog in the Night Time
by Mark Haddon
Alice in Wonderland
by Lewis Carroll
Slaughterhouse Five
by Kurt Vonnegut