Explain the encryption model or symmetric cipher model, Computer Network Security

Assignment Help:

With explain the encryption model the help of diagram.

Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encryption, also known as conventional encryption single-key or secret-key encryption.

A few symmetric key algorithms are stated below,

1. Data Encryption Standard also well known as DES

2. Triple DES also known as3DES

3. International Data Encryption Algorithm also known as IDEA

Symmetric cipher model as shown in the figure drawn below consists of five components,

Plaintext is defined as follows:

It refers to the original message which is not encrypted and is in human readable format. It forms the input to an encryption algorithm and output of or the decryption algorithm.

Example of it is

A text document is the executable file or the image.

2.   Encryption Algorithm is defined below:

Application of this algorithm will transform the plaintext to an unreadable, unintelligible form by performing many transformations and substitutions.

 3. Secret-key is defined below:

It is a cost of data which is randomly selected. It acts as an input to the encryption and decryption algorithms both. Thus, the sender and receiver both must share the same key and make sure which is secured, in order to restrict the intruders from reading the messages. The encryption algorithm does the transformations and substitutions on the plaintext consequently, depending on the key.

4. Cipher text is defined below:

It is a scrambled version of the plaintext and is not in a human-readable format. The cipher text produced by encryption algorithm depends on the secret-key and plain text. The encryption algorithm can produce different cipher text for the same plain text by using various secret-keys.

5.   Decryption Algorithm is defined below:

It is a reversed form of the encryption algorithm. It takes the cipher text (that is the encrypted data) as the input and decrypts it, using the same key which was used by the encryption algorithm in order to produce the plaintext (that is original message or data).


Related Discussions:- Explain the encryption model or symmetric cipher model

Types of idss and detection methods, Types of IDSs and Detection Methods ...

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Network management, Ask question #MinimAn NMS is connected to a remote netw...

Ask question #MinimAn NMS is connected to a remote network by a 64 Kb/s link. The network elements in the remote network generate 50 faults/second. Of these, 5% are critical and th

Risk control strategies-, Risk Control Strategies Once the ranked vulner...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Introduction to physical security, INTRODUCTION TO PHYSICAL SECURITY The...

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

Estimate the average throughput, Question (a) Estimate the average thr...

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Compare and contrast data encryption standard, Problem (a) Using Vigen...

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

Trap and trace systems-information security, TRAP AND TRACE SYSTEMS Trap...

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Parsing ipv6 headers, PARSING IPv6 HEADERS Base header is fixed in siz...

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Explain the various costs of quality, Problem 1: Show what are the bene...

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Describe header fields present in a udp segment, Question (a) In relati...

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd