cs 305 m4 written assignment

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

305

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by CommodoreTank10302

Laura Pittman Professor Shaykhian CS 305 November 26, 2023 Algorithm Ciphers The newest client is Artemis Financial which is a consulting company that develops individualized financial plans for their customers. The client wants to encrypt archive files and are specifically looking for advice about employing best practices for encryption of their long- term archive files. Based on Artemis Financial’s needs and security vulnerabilities the appropriate encryption algorithm cipher to deploy is the Advanced Encryption Standard (AES). This is because the AES algorithm is a symmetric block cipher that can encrypt and decrypt information by using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt in blocks of 128 bits (Federal Information Processing Standards Publications [FIPS PUBS], 2001). The hash function of the cipher allows the data to be converted into a compressed value to make it harder for hackers to access and read, and the bit levels are the numbers of characters of the key, and since AES has 128-, 192-, and 256-bit level security options there will be various options for Artemis Financial to choose from. Random numbers allow for unpredictability and add another layer of protection against hackers. Symmetric keys allow for execution time to be cut down while still allowing data to be secure, meanwhile asymmetric keys take longer to execute and are considered more secure due to the fact that two keys are needed. The AES algorithm will help Artemis Financial defend their archive files from various types of security attacks by protecting data from third parties and effectively encrypting both customer and company data. However, there are risks that must be considered when
recommending AES as it is imperative that all things be considered before implementing the encryption algorithm, such as the company’s ability to upgrade software in a timely manner and the ability to ensure secure input. Overall, it is clear to see why the AES algorithm is the recommended encryption algorithm.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help