Encryption_Assignment.docx - CIT 180 Encryption Algorithms Assignment 9 Instructions Match common encryption algorithms and methods with the scenarios

Encryption_Assignment.docx - CIT 180 Encryption Algorithms...

This preview shows page 1 - 2 out of 2 pages.

CIT 180- Encryption Algorithms Assignment 9 Instructions:Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. You may use the course textbook and the Internet to research encryption algorithms and methods. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange Elliptic curve cryptography (ECC) Blowfish Secure Sockets Layer (SSL) Transport Layer Security (TLS) Advanced Encryption Standard (AES) Digital signature Scenarios: Encryption Algorithm/Method Scenario Blowfish Since the company is small, this method is cost effective, and Blowfish operates well on mobile processors Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads' primary concern is protecting the data on the smartphones. Select an encryption solution that best

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture