Access over 20 million homework & study documents

search

INFA 610 week 4

Content type
User Generated
Rating
Showing Page:
1/1
There are three main types of cryptographic algorithms: (1) secret key, (2) public key, and (3)
hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and
describe how it works and where it is applied (For example SSL uses 3DES or DES) for message
encryption. Use your own words. When you pick an algorithm, try not to repeat. Be sure to
reference your sources.
I choose public key cryptographic algorithms with RSA because it is used for encryption and
decryption. This is a property which sets this scheme different than a symmetric encryption
scheme. Each receiver owns a unique decryption key, aka his/her private key. The receiver
needs to publish an encryption key, aka his/her public key. The validity of a public key is
needed to avoid spoofing by an adversary pretending to the receiver. This type of cryptosystem
involves a trusted third party who certifies that a unique public key belongs to a specific person
or entity only. Encryption algorithm is complicated enough to stop an attacker from
distinguishing the plaintext from the ciphertext and the encryption public key. Private and public
keys are related mathematically, but it is not possible to figure out the private key from the
public key. The rational part of any public-key cryptosystem is in designing a relationship
between two keys.
RSA is a cryptosystem for public-key encryption. It is used for securing sensitive data when sent
over an insecure network, such as the Internet. In RSA cryptography, both the public and the
private keys can encrypt a message; the opposite key from the one used to encrypt a message is
used to decrypt it. RSA signatures use a specific hash function. RSA supports encryption with
different levels of security possibilities. RSA’s security relies on large integers. Encryption
power is directly tied to key size, and doubling key length delivers an increase in strength. RSA
keys are 1024- or 2048-bits long. RSA provides a method of guaranteeing the confidentiality,
integrity, authenticity and non-reputability of electronic communications and data storage.
Cryptography.io. (n.d.) Asymmetric Algorithms. Retrieved from
https://cryptography.io/en/latest/hazmat/primitives/asymmetric/
SSL247.co.uk. (n.d.). What is RSA? Retrieved from https://www.ssl247.co.uk/kb/ssl-
certificates/generalinformation/what-is-rsa-dsa-ecc
Techopedia. (n.d.). RSA Encryption. Retrieved from
https://www.techopedia.com/definition/21852/rsa-encryption
-----------------------------------------------------------------------------------------------------------------

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
There are three main types of cryptographic algorithms: (1) secret key, (2) public key, and (3) hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied (For example SSL uses 3DES or DES) for message encryption. Use you ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4