StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Differentiate between the different types of cryptographic algorithms - Essay Example

Cite this document
Summary
Encryption is the process of coding information inform of cipher text for protection of information. The cipher text requires a decoding key to read the text. In cryptography, a key refers to a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Differentiate between the different types of cryptographic algorithms
Read Text Preview

Extract of sample "Differentiate between the different types of cryptographic algorithms"

Cryptographic algorithms Differentiation of different types of cryptographic algorithms Cryptographic algorithms are instruments used in the process of encryption of data. Encryption is the process of coding information inform of cipher text for protection of information. The cipher text requires a decoding key to read the text. In cryptography, a key refers to a sequence of bits which long and used in decryption or encryption algorithms. There are various forms of classifying Cryptographic algorithms.

The dominant and common form is the classification on the basis of the number of keys employed in encryption and decryption. There are three types of cryptographic algorithms. These are secret key cryptography, public key cryptography and hash functions (Schneier, 2007).First, secret key algorithms are also known as symmetric key algorithms. The major feature of symmetric algorithms is the single key for encryption and decryption. This means that, the sender of the information uses a particular key to encrypt the plain text to cipher text sent to the receiver.

After receiving information in the form of cipher text, the recipient uses the same key to decrypt the received message (Kessler, 2014). The single key used must be known to both sender and receiver of the message only. Therefore, the message sent is secret and only accessible by either sender or receiver.The second cryptographic algorithms are the public key cryptography. It is also known as asymmetric key cryptography. Public key cryptography involves two related keys although knowledge of one key cannot be used in determining the other key.

The sender of the message uses one key to encrypt the plain text while the receiver uses another different key to decrypt the message. The public key can be revealed publicly while only the message owner uses the private key (Kessler, 2014).Lastly, in Hash functions, a computed based hash value of a fixed length is used upon a plain text making it secure and unrecoverable. In most cases, harsh algorithms provide a “digital fingerprint” of files to ensure that no alteration occur on the file.

In addition, hash functions are used to encrypt passwords in many operating systems (Schneier, 2007).ReferenceKessler, G. (2014). Types of Cryptographic algorithms. An Overview of Cryptography. Retrieved from http://www.garykessler.net/library/crypto.htmlSchneier, B. (2007). Types of Cryptographic algorithms. Applied cryptography: protocols, algorithms, and source code in C (3rd ed). New York. Wiley

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Differentiate between the different types of cryptographic algorithms Essay”, n.d.)
Differentiate between the different types of cryptographic algorithms Essay. Retrieved from https://studentshare.org/information-technology/1626410-differentiate-between-the-different-types-of-cryptographic-algorithms
(Differentiate Between the Different Types of Cryptographic Algorithms Essay)
Differentiate Between the Different Types of Cryptographic Algorithms Essay. https://studentshare.org/information-technology/1626410-differentiate-between-the-different-types-of-cryptographic-algorithms.
“Differentiate Between the Different Types of Cryptographic Algorithms Essay”, n.d. https://studentshare.org/information-technology/1626410-differentiate-between-the-different-types-of-cryptographic-algorithms.
  • Cited: 1 times

CHECK THESE SAMPLES OF Differentiate between the different types of cryptographic algorithms

Software Requirements Specification

The second goal of the project is to improve communication between employees of a business and the headquarters of the business to ensure that there is better coordination amongst them all.... The paper "Software Requirements Specification" presents a service that would allow clients to forward their calls to them and PCI in turn would collect all the messages and forward them to employees that are on the road and away from their desk....
28 Pages (7000 words) Term Paper

Information Theory and Cryptography

1998)Towards these ends, three types of cryptographic schemes are generally used today.... The algorithms utilized in these schemes are described by the number of keys used to encrypt and decrypt data and additionally by their applications.... bull; Secret Key Cryptography (SKC) – These are symmetric algorithms using only a single key to both encrypt and decrypt.... bull; Public Key Cryptography (PKC) – These are asymmetric algorithms that use two keys – one key to encrypt and another to decrypt....
9 Pages (2250 words) Essay

Genetic Algorithms

Genetic algorithms are adaptive methods which may be used to resolve look for and optimization problems.... By mimicking this procedure, genetic algorithms are clever to "evolve" answers to real world problems, if they contain been suitably prearranged.... Genetic algorithms utilize a direct analogy of usual behavior.... ow contain they been productively practical to any real-world problems The authority of genetic algorithms come as of the fact that the technique is healthy, and can deal productively with a wide variety of problem areas, counting those which are hard for other techniques to solve....
5 Pages (1250 words) Essay

Hash Algorithm and Secure Hash Algorithm

For example, cryptographic hash functions assume the existence of an adversary who can deliberately try to find inputs with the same hash value.... A well-designed cryptographic hash function is a "one-way" operation: there is no practical way to calculate a particular data input that will result in a deseeded hash value, so it is also very difficult to forge.... Functions intended for cryptographic hashing, such as MD5, are commonly used as stock hash functions....
12 Pages (3000 words) Essay

Risk Assessment

This paper ''Risk Assessment'' discusses that risk assessment based on GFI network diagram.... Knowledge of the vulnerabilities existing in the network will facilitate the design of a solution to counter the threats.... nbsp;Risk assessment will be conducted ion GFI network to establish the likely areas of failure....
11 Pages (2750 words) Term Paper

Questions in Network Security

ombination of the two helps solve the associated slow problem of asymmetric algorithms since symmetric encryption is approximately a hundred to a thousand times faster than asymmetric encryption.... ow SSL/TLS works SSL and TLS certificates are small sized data files used to digitally attach a cryptographic key onto organizational details.... dvantages of combined a/symmetric cryptography over both cryptographies In symmetric key encryption (secret key encryption) method, data is scrambled by pressing same key to both decrypt and encrypt it while in asymmetric encryption (public key encryption), different keys are used to decrypt and encrypt....
1 Pages (250 words) Coursework

Using the Internet of Things Device in the Hackinig Process

This is not the case with the modern CE landscape, if not mounted through the internet interface then the solid side-channel attacks still exist, it is therefore required that these attacks be intercepted by solid ownership of the target and remove personal statistics laid by these gargets between the side channel e.... Positive place of nemesis, perhaps, this experiment might be repeated  by introducing an activator for exertion and adjusting assessment occurrences and then afterward get  approximate measurement of  the corresponding power event multiple  or several times over and over, in most cases, the secret data, for example,  Advanced Encryption Standard (AES) key, do not frequently  become different, such pounced tests might be redone severally till nemesis has the logical data that bout is found and utilized....
19 Pages (4750 words) Term Paper

Cryptographic Protocols: Kerberos and IPSec

The main different between the two is that Kerberos authenticates user- to-service communications and IPSec authenticates computer-to-computer communication.... This report will try to explain and contrast role, function of the two cryptographic protocols: Kerberos and IPSec.... This is just a layer that can be found between TCP and the physical layer....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us