MSIT 3150-Assignment 3

.docx

School

Clark University *

*We aren’t endorsed by this school

Course

3150

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by PrivateMorning9896

Report
Assignment 3 Assignment 3 School of Professional Studies, Clark University MSIT3150-01-F23 : Security Architecture & Design Professor Peter Sullivan September 15, 2023 1. Question 1 1
Assignment 3 On the Internet, encryption is critical for protecting sensitive information while also ensuring privacy and security. The practice of encoding information or data into a code to prevent unwanted access or interception is known as encryption. It means using an algorithm and a key to convert plaintext into ciphertext, which can only be decoded by someone with the appropriate decryption key. In everyone's day-to-day life, we know it or not, many systems use encryption algorithms to secure the communication. For example, online banking protects financial information from attackers during account access and transactions in online banking, with the "https://" denoting a secure connection. Email providers use encryption to secure email content, and services such as ProtonMail provide end-to-end encryption for sender-recipient privacy. In addition, encryption secures websites and encrypts data in transit, such as login passwords and payment card information, to prevent eavesdropping. Cloud storage services use encryption to protect files, frequently with client-side encryption to prevent service provider access. Furthermore, virtual private networks (VPNs) use encryption to ensure the secrecy of data transmitted by remote workers to their company's networks. 2. Question 2 Developing a safe encryption method is a difficult challenge. Cryptographers spend years creating and testing algorithms to assure the security of algorithms. Alice should be prepared for the complexities involved and aware that even slight errors can lead to severe weaknesses and exposure to information. I would personally not recommend Alice to develop her own encryption algorithm. I would advise Alice to assess if her project needs this new algorithm or whether she can achieve her objectives using a well-known and secure encryption algorithm such as AES. For several reasons, creating a new algorithm has more drawbacks than benefits for Alice. 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help