Symmetric encryption-cryptography, Computer Network Security

Symmetric Encryption

This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encryption methods uses mathematical operations so it is efficient needs only minimal processing. Both sender and receiver should possess encryption key. If any copy of key is compromised, an intermediate can decrypt and the read messages which was being sent.

The several methods of symmetric encryption techniques are as follows:

Data Encryption Standard (DES) – It is one of the popular symmetric encryption cryptosystems that uses 64-bit block size of plaintext and 56-bit key. This method is adopted by NIST in the year 1976 as federal standard for encrypting non-classified information.
Triple DES (3DES) – This method is formed to provide security far beyond
DES.
Advanced Encryption Standard (AES) – This technique was developed to replace DES and 3DES both.

Posted Date: 10/9/2012 2:29:03 AM | Location : United States







Related Discussions:- Symmetric encryption-cryptography, Assignment Help, Ask Question on Symmetric encryption-cryptography, Get Answer, Expert's Help, Symmetric encryption-cryptography Discussions

Write discussion on Symmetric encryption-cryptography
Your posts are moderated
Related Questions
Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo