Explain the encryption model or symmetric cipher model, Computer Network Security

Assignment Help:

With explain the encryption model the help of diagram.

Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encryption, also known as conventional encryption single-key or secret-key encryption.

A few symmetric key algorithms are stated below,

1. Data Encryption Standard also well known as DES

2. Triple DES also known as3DES

3. International Data Encryption Algorithm also known as IDEA

Symmetric cipher model as shown in the figure drawn below consists of five components,

Plaintext is defined as follows:

It refers to the original message which is not encrypted and is in human readable format. It forms the input to an encryption algorithm and output of or the decryption algorithm.

Example of it is

A text document is the executable file or the image.

2.   Encryption Algorithm is defined below:

Application of this algorithm will transform the plaintext to an unreadable, unintelligible form by performing many transformations and substitutions.

 3. Secret-key is defined below:

It is a cost of data which is randomly selected. It acts as an input to the encryption and decryption algorithms both. Thus, the sender and receiver both must share the same key and make sure which is secured, in order to restrict the intruders from reading the messages. The encryption algorithm does the transformations and substitutions on the plaintext consequently, depending on the key.

4. Cipher text is defined below:

It is a scrambled version of the plaintext and is not in a human-readable format. The cipher text produced by encryption algorithm depends on the secret-key and plain text. The encryption algorithm can produce different cipher text for the same plain text by using various secret-keys.

5.   Decryption Algorithm is defined below:

It is a reversed form of the encryption algorithm. It takes the cipher text (that is the encrypted data) as the input and decrypts it, using the same key which was used by the encryption algorithm in order to produce the plaintext (that is original message or data).


Related Discussions:- Explain the encryption model or symmetric cipher model

Computer security, For this assessment, students must research and analyse ...

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Virtual terminal protocol vtp, Write down the short notes on VTR.  Communic...

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Draw a suitable physical network diagram, Question a) From the capture ...

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

CNSS, Assume that a security model is needed for the protection of informat...

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

What standards are to be applied, Government funding has been given to a un...

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Application gateways / firewall-information security, Application Gateways ...

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Efforts of advanced research project agency, ADVANCED RESEARCH PROJECT AGEN...

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

Policy management-information security, POLICY MANAGEMENT Policies should...

POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd