This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

<NAME> NT2580 11 February 2013 NT2580: Unit 7 Select Appropriate Encryption Algorithms Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange International Data Encryption Algorithm (IDEA) El Gamal encryption algorithm Carlisle Adams and Stafford Taveres (CAST) algorithm Elliptic curve cryptography (ECC) Blowfish Secure Sockets Layer (SSL) Advanced Encryption Standard (AES) Digital signature Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. My recommendations for this companys email concerns are the following algorithms; Rivest, Shamir, and Adleman (RSA) encryption algorithm Diffie-Hellman key exchange Secure Sockets Layer (SSL) The reasoning for this is that the RSA algorithm is considered the most common public key encryption algorithm that can be used for either digital signatures or for encryption. encryption algorithm that can be used for either digital signatures or for encryption.... View Full Document

End of Preview

Sign up now to access the rest of the document