Symmetric encryption-cryptography, Computer Network Security

Symmetric Encryption

This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encryption methods uses mathematical operations so it is efficient needs only minimal processing. Both sender and receiver should possess encryption key. If any copy of key is compromised, an intermediate can decrypt and the read messages which was being sent.

The several methods of symmetric encryption techniques are as follows:

Data Encryption Standard (DES) – It is one of the popular symmetric encryption cryptosystems that uses 64-bit block size of plaintext and 56-bit key. This method is adopted by NIST in the year 1976 as federal standard for encrypting non-classified information.
Triple DES (3DES) – This method is formed to provide security far beyond
DES.
Advanced Encryption Standard (AES) – This technique was developed to replace DES and 3DES both.

Posted Date: 10/9/2012 2:29:03 AM | Location : United States







Related Discussions:- Symmetric encryption-cryptography, Assignment Help, Ask Question on Symmetric encryption-cryptography, Get Answer, Expert's Help, Symmetric encryption-cryptography Discussions

Write discussion on Symmetric encryption-cryptography
Your posts are moderated
Related Questions
Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Network diagram for a mediacal care

on LAN,where are IP datagrams transported?

define .

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The