Symmetric encryption-cryptography, Computer Network Security

Symmetric Encryption

This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encryption methods uses mathematical operations so it is efficient needs only minimal processing. Both sender and receiver should possess encryption key. If any copy of key is compromised, an intermediate can decrypt and the read messages which was being sent.

The several methods of symmetric encryption techniques are as follows:

Data Encryption Standard (DES) – It is one of the popular symmetric encryption cryptosystems that uses 64-bit block size of plaintext and 56-bit key. This method is adopted by NIST in the year 1976 as federal standard for encrypting non-classified information.
Triple DES (3DES) – This method is formed to provide security far beyond
DES.
Advanced Encryption Standard (AES) – This technique was developed to replace DES and 3DES both.

Posted Date: 10/9/2012 2:29:03 AM | Location : United States







Related Discussions:- Symmetric encryption-cryptography, Assignment Help, Ask Question on Symmetric encryption-cryptography, Get Answer, Expert's Help, Symmetric encryption-cryptography Discussions

Write discussion on Symmetric encryption-cryptography
Your posts are moderated
Related Questions
Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

SDES encryption and decryption

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti