Cryptographic algorithms

Assignment Help Science
Reference no: EM133093656

Your task: You have been asked to give a presentation to the Chief Technology Officer's (CTO's) staff for their monthly "brown bag" luncheons. The subject of this session is: Use and Misuse of Encryption.

Background: Cryptographic algorithms provide the underlying tools to most security protocols used to implement encryption in enterprises and critical infrastructures. The choice of which type of algorithm to implement depends on the goal that you are trying to accomplish, e.g. ensuring data privacy or ensuring integrity of software or data. Cryptographic algorithms fall into two main categories: symmetric key and asymmetric key cryptography.

In the first part of your briefing to CTO Staff, please identify and discuss the strengths and weaknesses of

symmetric key cryptography

asymmetric key cryptography

For each type of cryptographic algorithm, you should provide an example of where this type of cryptography would be used within the software and services that the enterprise depends upon and the type of resource to be protected (e.g. passwords stored in hashed format).

In the second part of your briefing, identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives. These could include using encrypted chat to avoid wiretaps or surveillance or using encryption to deny legitimate users access to data or systems (e.g. ransomware). If countermeasures are available, describe and discuss them.

Reference no: EM133093656

Questions Cloud

Discuss the notion of consumer vulnerability : Discuss the notion of consumer vulnerability. What does this mean and what does ethical marketing require of businesses?
Why is crisis management important : Why is crisis management important? Provide examples and sources.
Digital efforts focus on attracting new visitors : Should the digital efforts focus on attracting new visitors to Tate's physical galleries or deepen relationships with existing visitors? Explain your point of v
What is the amount of patient service revenue : The hospital also wrote off bad debts of $100,000. What is the amount of patient service revenue the hospital will report on its operating statement
Cryptographic algorithms : Cryptographic algorithms provide the underlying tools to most security protocols used to implement encryption in enterprises and critical infrastructures.
Report type start up business : Start up business that is going to be functional in the near future (i want to to do a business related to computers because i have more knowledge in this area,
A case study of high inflation : Please write 150 words summary of " Suriname: A Case Study of High Inflation"?
What price should it trade at : The dividend is then expected to grow at 4% per year. If investors require a 14% return to hold the stock, what price should it trade at
Discuss the important of three major classification costs : Discuss The Important of three major classification costs. 1. Reasonable, allowable, and allocable costs

Reviews

Write a Review

Science Questions & Answers

  Journal of pharmaceutical sciences

This journal is a scientific publication of Indian Pharmaceutical Association and highlights various bright points of it.

  Optical fibres

This document discuss about the main attributes and characteristics of optical fibres.

  Micro organisms

This project report reveals the fact and proves a specific objective mentioned to be studied upon.

  Describing histology of an organ

The discussion of the technique should include a literature review on the evolution of the technique.

  Interpret the sensitivity of mammography

Calculate and interpret the sensitivity of mammography. Diagnostic test with Sensitivity 50%, Specificity 50% and prevalence 50%. Crude mortality rate. Damage caused by motor vehicle accidents.

  Discuss the role that science plays in your daily life

Role that science plays in your daily life and Integrity, Intensity, Innovation, and involvement in scientific field

  Prepare a flexible budget gator divers

Prepare a Flexible Budget Gator Divers is a company that provides diving services such as underwater ship repairs to clients in the Tampa Bay area.

  Neurological disorders

Designing a neuroprosthesis for the neurological disorders

  Complexity of cell surfaces

Lipid rafts provide another example of the complexity of cell surfaces in both their structural character and biologic functionality. Please explain the nature of these structures and their functionality.

  Exploratory activity on bird beaks

Describe how natural selection and evolution are demonstrated by this activity

  Spatial and temporal variation of heat content in the upper

In this study the temporal and spatial variation of heat content in the upper 70m layer of the Arabian Sea was for a period of 1991 to 2008 have been attempted.

  Earthquake databases

Earthquake Databases

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd