2 - UNIT 7, Assignment 1, Encryption Types - Cuneo, Thomas...

This preview shows page 1 - 2 out of 3 pages.

The preview shows page 1 - 2 out of 3 pages.
Cuneo, Thomas2-6-14NT2580WK – 7In Class Assignment: Encryption Types1.Data Encryption Standard (DES):The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipherdesigns which have been designated cryptography standards by the US government (though DES'sdesignation was finally withdrawn after the AES was adopted).2.Rivest, Shamir, and Adleman Encryption (RSA):RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by RonRivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption andauthentication algorithm and is included as part of the Web browsers from Microsoft and Netscape. It's alsopart of Lotus Notes, Intuit's Quicken, and many other products. The encryption system is owned by RSASecurity.The mathematical details of the algorithm used in obtaining the public and private keys are available at theRSA Web site. Briefly, the algorithm involves multiplying two large prime numbers (a prime number is anumber divisible only by that number and 1) and through additional operations deriving a set of twonumbers that constitutes the public key and another set that is the private key. Once the keys have beendeveloped, the original prime numbers are no longer important and can be discarded. Both the public andthe private keys are needed for encryption /decryption but only the owner of a private key ever needs toknow it. Using the RSA system, the private key never needs to be sent across the Internet.The private key is used to decrypt text that has been encrypted with the public key. Thus, if I send you amessage, I can find out your public key (but not your private key) from a central administrator and encrypta message to you using your public key. When you receive it, you decrypt it with your private key. In

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
Cryptography, Advanced Encryption Standard, Encryption algorithm, Data Encryption Standard, Encryption Standard

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture