Symmetric encryption-cryptography, Computer Network Security

Symmetric Encryption

This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encryption methods uses mathematical operations so it is efficient needs only minimal processing. Both sender and receiver should possess encryption key. If any copy of key is compromised, an intermediate can decrypt and the read messages which was being sent.

The several methods of symmetric encryption techniques are as follows:

Data Encryption Standard (DES) – It is one of the popular symmetric encryption cryptosystems that uses 64-bit block size of plaintext and 56-bit key. This method is adopted by NIST in the year 1976 as federal standard for encrypting non-classified information.
Triple DES (3DES) – This method is formed to provide security far beyond
DES.
Advanced Encryption Standard (AES) – This technique was developed to replace DES and 3DES both.

Posted Date: 10/9/2012 2:29:03 AM | Location : United States







Related Discussions:- Symmetric encryption-cryptography, Assignment Help, Ask Question on Symmetric encryption-cryptography, Get Answer, Expert's Help, Symmetric encryption-cryptography Discussions

Write discussion on Symmetric encryption-cryptography
Your posts are moderated
Related Questions
(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID