Symmetric encryption-cryptography, Computer Network Security

Symmetric Encryption

This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encryption methods uses mathematical operations so it is efficient needs only minimal processing. Both sender and receiver should possess encryption key. If any copy of key is compromised, an intermediate can decrypt and the read messages which was being sent.

The several methods of symmetric encryption techniques are as follows:

Data Encryption Standard (DES) – It is one of the popular symmetric encryption cryptosystems that uses 64-bit block size of plaintext and 56-bit key. This method is adopted by NIST in the year 1976 as federal standard for encrypting non-classified information.
Triple DES (3DES) – This method is formed to provide security far beyond
DES.
Advanced Encryption Standard (AES) – This technique was developed to replace DES and 3DES both.

Posted Date: 10/9/2012 2:29:03 AM | Location : United States







Related Discussions:- Symmetric encryption-cryptography, Assignment Help, Ask Question on Symmetric encryption-cryptography, Get Answer, Expert's Help, Symmetric encryption-cryptography Discussions

Write discussion on Symmetric encryption-cryptography
Your posts are moderated
Related Questions
UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

what is an SSID?


Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :