Analyzing The Three Types Of Cryptography

1197 Words May 3rd, 2016 5 Pages
Chapter 5 Review_CIS591_Spring16 Chapter Summary
After reading this chapter and completing the exercises, you should understand the following about cryptography.
Identify and describe the three types of cryptography
Symmetric cryptography is based upon the idea of a common mystery or key. Asymmetric cryptography is based upon a key that can be made transparently accessible to the general population, yet still give security.
One-way, or hashing, cryptography takes information and enciphers it. Be that as it may, there is no real way to disentangle it and no key
List and describe current cryptographic algorithms
Hashing is the utilization of a restricted capacity to produce a message outline for information uprightness. Hashing calculations incorporate SHA and MD (Message Digest).
Symmetric is a common mystery type of encoding information for secrecy; it is quick and solid, however needs secure key administration.
Symmetric calculations incorporate DES (Data Encryption Standard), 3DES, AES (Advanced Encryption Standard), CAST, Blowfish, IDEA, and RC (Rivest Cipher) variations.
Asymmetric is an open/private keypair encryption utilized for verification, nonrepudiation, and classification.
Asymmetric calculations incorporate RSA, Diffie-Hellman, ElGamal, and ECC.
Explain how cryptography is applied for security
Classification is picked up in light of the fact that encryption is great at scrambling data to make it look like irregular commotion, when actually a key can…

More about Analyzing The Three Types Of Cryptography

Open Document