cs 305 m4 written assignment
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
305
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by CommodoreTank10302
Laura Pittman
Professor Shaykhian
CS 305
November 26, 2023
Algorithm Ciphers
The newest client is Artemis Financial which is a consulting company that develops
individualized financial plans for their customers. The client wants to encrypt archive files and
are specifically looking for advice about employing best practices for encryption of their long-
term archive files. Based on Artemis Financial’s needs and security vulnerabilities the
appropriate encryption algorithm cipher to deploy is the Advanced Encryption Standard (AES).
This is because the AES algorithm is a symmetric block cipher that can encrypt and decrypt
information by using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt in
blocks of 128 bits (Federal Information Processing Standards Publications [FIPS PUBS], 2001).
The hash function of the cipher allows the data to be converted into a compressed value
to make it harder for hackers to access and read, and the bit levels are the numbers of characters
of the key, and since AES has 128-, 192-, and 256-bit level security options there will be various
options for Artemis Financial to choose from. Random numbers allow for unpredictability and
add another layer of protection against hackers. Symmetric keys allow for execution time to be
cut down while still allowing data to be secure, meanwhile asymmetric keys take longer to
execute and are considered more secure due to the fact that two keys are needed.
The AES algorithm will help Artemis Financial defend their archive files from various
types of security attacks by protecting data from third parties and effectively encrypting both
customer and company data. However, there are risks that must be considered when
recommending AES as it is imperative that all things be considered before implementing the
encryption algorithm, such as the company’s ability to upgrade software in a timely manner and
the ability to ensure secure input. Overall, it is clear to see why the AES algorithm is the
recommended encryption algorithm.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Symmetric key ciphers - Include the notes needed to encrypt or decrypt each of the following ciphers.
Cipher
|Additive
Encryption Process
Decryption Process
|Multiplicative
| Auto-key
Playfair
Vigenere
|Transposition
arrow_forward
Computing And Software Systems
arrow_forward
can soneone help me answer this question?
- NONREPUDIATION
-UTILITY
-AVAILABILITY
-PRIVACY
arrow_forward
Data Encryptions and Cryptography
using playfair classical cipher algorithm,Decrypt the encrypted message "NVCZCRKAO". shared secret key is "ILOVEFKI". SHOW THE CALCULATION on how you get the answer
arrow_forward
What are the two most prevalent types of encryption?
arrow_forward
Symmetric encryption has drawbacks, especially in key management.
arrow_forward
Public-key encryption, which uses a cryptographic algorithm to generate one symmetric key from another one, and uses those two mathematically related symmetric keys, is also known as [answer] cryptography
arrow_forward
How does the process of encryption help protect data during transmission and storage?
arrow_forward
Why is hashing passwords stored in files preferable than encryption?
arrow_forward
write introduction about security services
overview about symmetric and asymmetric encryption
discuss two algorithms for each encryption type (asymmetric and symmetric)
support your report with examples and applications are using these algorithms.
explain " defense in depth" and defense in breadth " security appraches and compare between them
arrow_forward
Artemis Financial is looking to encrypt their archive files and they need advice from you, as the developer and security expert, on employing best practices for encrypting their long-term archive files. You will need to research and identify the best and most secure cipher available today to recommend to Artemis Financial. Ultimately, you will recommend the algorithm cipher for file encryption that is most appropriate for their needs.
Your recommendations should be documented and delivered to Artemis Financial. This work will inform your continued work with Artemis Financial in Project Two. However, the specifics of this assignment will not be required as a deliverable in Project Two.
Address the following in your recommendations to Artemis Financial:
Algorithm Cipher: Review the scenario and the Java Security Standard Algorithm Names, a standard list of algorithm ciphers provided by Oracle for recommending an appropriate encryption algorithm cipher. Specifically, recommend an…
arrow_forward
Public key cryptosystems are: (more than one may be true, choose all that are true)
a offering a simpler way for key distribution
B faster than symmetric
C the preferred solution when the message we want to encrypt is very large
D easily used to offer integrity
E requiring advanced hardware in order to use them
F easily used to offer confidentiality
G marketed better than symmetric that is why people prefer them
H using one key for encryption and a different key for decryption
arrow_forward
Topic: Cryptographic Active Attack
Kindly discuss the Modification of Messages in simple terms.
arrow_forward
Why is hashing passwords preferable to encrypting them when storing them in a file? ..
arrow_forward
Topic: Cryptographic Active Attack
Kindly discuss the Denial of Service in simple terms.
arrow_forward
all the following correct about digital signatures except
Used for authenticating both source and data integrity
Created by encrypting hash code with receiver private key
Does not provide confidentiality
Protect the Massage from alteration but not from eavesdropping
arrow_forward
Explain the process of setting up and configuring BitLocker encryption in Windows for enhanced data security.
arrow_forward
Why is it preferable to hash rather than encrypt a file containing user passwords?
arrow_forward
What use does the default encryption serve?
arrow_forward
Internet search for "Announcing the Advanced Encryption Standard (AES)" This standard FIPS 197 document should be read. Describe in brief how this cryptosystem was designed and implemented.
arrow_forward
Q) Write a detailed explanation on how cookies work in web
technologies. In your explanation, please address the following points:
Definition: Define what cookies are in the context of web technologies.
Creation and Storage: Explain how cookies are created and where they
are stored.
Usage: Discuss how cookies are used by websites for session
management, personalization, and tracking user behavior.
Security Concerns: Discuss any security concerns associated with the use
of cookies and how they can be mitigated.
Alternatives: Are there any alternatives to cookies in modern web
development? If so, discuss them.
arrow_forward
Data Encryptions and Cryptography
using playfair classical cipher algorithm,Decrypt the encrypted message "NVCZCRKAO". shared secret key is "ILOVEFKI". SHOW THE WORKING on how you get the answer
arrow_forward
Match as appropriate
arrow_forward
Key Differences Between Private and Public Cryptographic Keys
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Symmetric key ciphers - Include the notes needed to encrypt or decrypt each of the following ciphers. Cipher |Additive Encryption Process Decryption Process |Multiplicative | Auto-key Playfair Vigenere |Transpositionarrow_forwardComputing And Software Systemsarrow_forwardcan soneone help me answer this question? - NONREPUDIATION -UTILITY -AVAILABILITY -PRIVACYarrow_forward
- Data Encryptions and Cryptography using playfair classical cipher algorithm,Decrypt the encrypted message "NVCZCRKAO". shared secret key is "ILOVEFKI". SHOW THE CALCULATION on how you get the answerarrow_forwardWhat are the two most prevalent types of encryption?arrow_forwardSymmetric encryption has drawbacks, especially in key management.arrow_forward
- Public-key encryption, which uses a cryptographic algorithm to generate one symmetric key from another one, and uses those two mathematically related symmetric keys, is also known as [answer] cryptographyarrow_forwardHow does the process of encryption help protect data during transmission and storage?arrow_forwardWhy is hashing passwords stored in files preferable than encryption?arrow_forward
- write introduction about security services overview about symmetric and asymmetric encryption discuss two algorithms for each encryption type (asymmetric and symmetric) support your report with examples and applications are using these algorithms. explain " defense in depth" and defense in breadth " security appraches and compare between themarrow_forwardArtemis Financial is looking to encrypt their archive files and they need advice from you, as the developer and security expert, on employing best practices for encrypting their long-term archive files. You will need to research and identify the best and most secure cipher available today to recommend to Artemis Financial. Ultimately, you will recommend the algorithm cipher for file encryption that is most appropriate for their needs. Your recommendations should be documented and delivered to Artemis Financial. This work will inform your continued work with Artemis Financial in Project Two. However, the specifics of this assignment will not be required as a deliverable in Project Two. Address the following in your recommendations to Artemis Financial: Algorithm Cipher: Review the scenario and the Java Security Standard Algorithm Names, a standard list of algorithm ciphers provided by Oracle for recommending an appropriate encryption algorithm cipher. Specifically, recommend an…arrow_forwardPublic key cryptosystems are: (more than one may be true, choose all that are true) a offering a simpler way for key distribution B faster than symmetric C the preferred solution when the message we want to encrypt is very large D easily used to offer integrity E requiring advanced hardware in order to use them F easily used to offer confidentiality G marketed better than symmetric that is why people prefer them H using one key for encryption and a different key for decryptionarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning