28 Jun What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer? Question B How does public key cry
REPLY 1
Question A
What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?
Question B
How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?
REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)
CLASSMATE’S DISCUSSION
Question A
The three common encryption ciphers used to protect network communications are monoalphabetic, polyalphabetic, and transposition cipher. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters, (White, 2016). This type of cipher is simple. However, there is a disadvantage of the frequency of the substituting. The polyalphabetic substitution-based cipher is similar to the mono alphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string, (White, 2016). This type of cipher is better because it prevents a frequency analysis or algorithms from decoding easily. A transposition-based cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved, (White, 2016). With the transposition cipher the character is moved but not changed.
Reference:
White, C. (2016). Data Communications and Computer Networks: A Business User's Approach
(Independence, KY: Cengage Learnings ISBN: 9781305729902 8th ed.).
Question B
Data encrypted with the public key can be decoded only with the public key, and data encrypted with the private key can be decoded only with the public key, (White, C. 2016). Public key cryptography provides protection to network data when one person or organization has either a key to code or decode. One end will have the public key that encrypts, and the other private key will decode the ciphertext.
Reply 2
Question A
What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?
Question B
How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?
REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)
CLASSMATE’S DISCUSSION
Question A
Question A – Triple DES, AES ad RSA are the most common encryption ciphers.
Triple DES was a recommended encryption standard and at one point, used to be one of the most used symmetric algorithm in the industry. Triple DES uses three keys that are 56 bits each. Although total key length is supposed to be 168 bits, some argue they are 112 bits in strength.
AES is the algorithm standard used by the US government and a good number of companies and organizations. AES comes in 128, 192, and 256 ciphers. AES is one of the most resilient encryption ciphers in the market today.
RSA is a public key encryption algorithm and the standard encryption for data sent over the internet. Those familiar with PGP will know that RSA is one of the encryption methods used in the program. This encryption algorithm is asymmetric, requiring a public key to encrypt the message and a private key to decrypt it.
Question B
Public cryptography works on the principle of using two keys, a public key and a private key to protect the data. The user of the technology receives a public/private key pair from a certified authority. When data is sent to other users, they have access to the public key from the sender, which has been used to encrypt the data. When the message arrives at its destination, the recipient can then use its private key to decrypt the message.
The major elements that support this system are the public/private key pairs, the certifying authority and the principle of public keys, which eliminates the need for users to exchange their private keys.
Reference:
– Lord, N. (2018). A definition of public cryptography. Retrieved Jun 22, 2022 from https://digitalguardian.com/blog/what-public-key-cryptography
This question was first posted at writeden.com!
Order this paper at writeden.com
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.