Explain the encryption model or symmetric cipher model, Computer Network Security

Assignment Help:

With explain the encryption model the help of diagram.

Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encryption, also known as conventional encryption single-key or secret-key encryption.

A few symmetric key algorithms are stated below,

1. Data Encryption Standard also well known as DES

2. Triple DES also known as3DES

3. International Data Encryption Algorithm also known as IDEA

Symmetric cipher model as shown in the figure drawn below consists of five components,

Plaintext is defined as follows:

It refers to the original message which is not encrypted and is in human readable format. It forms the input to an encryption algorithm and output of or the decryption algorithm.

Example of it is

A text document is the executable file or the image.

2.   Encryption Algorithm is defined below:

Application of this algorithm will transform the plaintext to an unreadable, unintelligible form by performing many transformations and substitutions.

 3. Secret-key is defined below:

It is a cost of data which is randomly selected. It acts as an input to the encryption and decryption algorithms both. Thus, the sender and receiver both must share the same key and make sure which is secured, in order to restrict the intruders from reading the messages. The encryption algorithm does the transformations and substitutions on the plaintext consequently, depending on the key.

4. Cipher text is defined below:

It is a scrambled version of the plaintext and is not in a human-readable format. The cipher text produced by encryption algorithm depends on the secret-key and plain text. The encryption algorithm can produce different cipher text for the same plain text by using various secret-keys.

5.   Decryption Algorithm is defined below:

It is a reversed form of the encryption algorithm. It takes the cipher text (that is the encrypted data) as the input and decrypts it, using the same key which was used by the encryption algorithm in order to produce the plaintext (that is original message or data).


Related Discussions:- Explain the encryption model or symmetric cipher model

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

Network security keys, The three primary types of network protection are th...

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Base lining-information security, Base lining •    Organizations do not ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Example bus network , Ethernet is a commonly used LAN technology. It was di...

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

Tcp and udp, TCP and UDP End-to-end delivery application is connection...

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Quote, How much would it cost to have a project completed by tomorrow night...

How much would it cost to have a project completed by tomorrow night?

Tree decomposition, (a) Define what you understand by the following terms ...

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

What do you meant by the term diffusion and confusion, Question: (a) W...

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd