Muessel_Week 1 Assignment.docx

Muessel_Week 1 Assignment.docx - Jason Muessel Week 1...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Jason Muessel 1 Week 1 Written Assignment: Substitution Ciphers Jason Muessel CIS313-H330 Cryptography (2185-DD) Bellevue University Professor Amerson March 22, 2018
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Jason Muessel 2 Summary The first article researched is on data encryption is from Information Security Magazine ; and the title of the article is: Understanding encryption and cryptography basics . This author of the article is: Rick Smith Ph.D., CISSP; Rick Smith is a writer, lecturer and consultant on information security. The article begins by discussing the data standards in the 1980’s and the fact that the Data Encryption Standard (DES) was primarily the only choice. The author goes into more detail stating that today a wider selection is available; and the problem is having the developer select the correct one for the job. The article discusses the differences between many ciphers including private-key ciphers and public-key ciphers. The author provides general facts and data while informing the reader a general sense of the era that these ciphers were originally implemented. The concept of ciphers is to allow two people to exchange information privately. “Quality encryption always follows a fundamental rule: the actual procedure being used, the algorithm, doesn't need to be kept secret. But the key does. Even the sharpest hacker in the world will be unable to decrypt data as long as the key remains secret.” (Smith, 2018) What makes a strong cipher? 1. Infrastructure it runs on – “If the cryptography is implemented primarily in software, then the infrastructure will be the weakest link.” (Smith, 2018) One way to is to try to steal the message or information before it is encrypted. 2. Key Size – “In cryptography, key size matters. If an attacker can't install a keystroke monitor, then the best way to crack the ciphertext is to try to guess the key through a "brute-force" trial-and-error search. A practical cipher must use a key size that makes brute-force searching impractical. However, since computers get faster every year, the
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern