Need discussion in 12 hours or less

  

REPLY 1

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                  CLASSMATE’S DISCUSSION

Question A

The three common encryption ciphers used to protect network communications are monoalphabetic, polyalphabetic, and transposition cipher. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters, (White, 2016). This type of cipher is simple. However, there is a disadvantage of the frequency of the substituting. The polyalphabetic substitution-based cipher is similar to the mono alphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string, (White, 2016). This type of cipher is better because it prevents a frequency analysis or algorithms from decoding easily. A transposition-based cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved, (White, 2016). With the transposition cipher the character is moved but not changed.

Reference:

White, C. (2016). Data Communications and Computer Networks: A Business User’s Approach

(Independence, KY: Cengage Learnings ISBN: 9781305729902 8th ed.). 

Question B

Data encrypted with the public key can be decoded only with the public key, and data encrypted with the private key can be decoded only with the public key, (White, C. 2016). Public key cryptography provides protection to network data when one person or organization has either a key to code or decode. One end will have the public key that encrypts, and the other private key will decode the ciphertext.

Reply 2

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                   CLASSMATE’S DISCUSSION

Question A

Question A – Triple DES, AES ad RSA are the most common encryption ciphers.

Triple DES was a recommended encryption standard and at one point, used to be one of the most used symmetric algorithm in the industry. Triple DES uses three keys that are 56 bits each. Although total key length is supposed to be 168 bits, some argue they are 112 bits in strength. 

AES is the algorithm standard used by the US government and a good number of companies and organizations. AES comes in 128, 192, and 256 ciphers. AES is one of the most resilient encryption ciphers in the market today.

RSA is a public key encryption algorithm and the standard encryption for data sent over the internet. Those familiar with PGP will know that RSA is one of the encryption methods used in the program. This encryption algorithm is asymmetric, requiring a public key to encrypt the message and a private key to decrypt it.

Question B

Public cryptography works on the principle of using two keys, a public key and a private key to protect the data. The user of the technology receives a public/private key pair from a certified authority. When data is sent to other users, they have access to the public key from the sender, which has been used to encrypt the data. When the message arrives at its destination, the recipient can then use its private key to decrypt the message.

The major elements that support this system are the public/private key pairs, the certifying authority and the principle of public keys, which eliminates the need for users to exchange their private keys. 

Reference:

– Lord, N. (2018). A definition of public cryptography. Retrieved Jun 22, 2022 from  https://digitalguardian.com/blog/what-public-key-cryptography

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more