Encryption

User Generated

fnxno_uuz

Computer Science

Description

Write 5 pages paper about cryptography and include the following:
• Proper introduction.
• Symmetric Encryption including 3DES and AES protocols.
• Asymmetric Encryption including RSA.
• Hash Digest including MD5 and SHA256.
• Detail explanation of Diffie-Hellman Key Exchange.
• Proper conclusion.



Cite references according to APA style.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: ENCRYPTION

1

Encryption
Institution Affiliation
Date

ENCRYPTION

2

The security of the information and data transmissions from one to end to another is vital
both at a personal level and for the organization. Encryption is the method that ensures that the
data security protection against unauthorized users. This method converts a plaintext into an
encoded that can only be interpreted in a known language by use of a decryption key. This
process enhances the protection of the data across are networks involved in transmission. In
protection of the information in the internet users, which is transmitted between the browser and
the server, encryption is used to ensure the personal information is protected from unauthorized
users. This paper discusses in detail the different categories of the encryption algorithms used
for the protection of the data and other personal information. The benefits that are accrued after
the installation of the distinct encryption mechanisms.
The organization has a responsibility to ensure the data and other information are kept
safe at all time and in all transactions it carries. This ensures the data and information in the
hands of the authorized users is not accessed by attackers. The encryption process ensures the
safety of the data, where it takes in account the plaintext that is intended to be transmitted is
concealed in a form that no hardware or unauthorized user is able to access it; this is achieved by
using an encryption algorithm and a unique encryption key. The encrypted text produced in an
unreadable form that can only be made readable by decryption by a user of an encryption key.
This key is only availed to authorized users, making sure that only the users that are allowed to
read the text can access a data or information. In order to achieve the security of data and
information, different algorithms are used. They include the symmetric and asymmetric
encryption algorithms, which are mostly used today by different entities to secure their data and
their customer’s ...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags