100%(3)3 out of 3 people found this document helpful
This preview shows page 1 - 2 out of 2 pages.
CIT 180- Encryption AlgorithmsAssignment 9Instructions:Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. You may use the course textbook and the Internet to research encryption algorithms and methods.Common encryption algorithms and methods:Data Encryption Standard (DES)Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange Elliptic curve cryptography (ECC) Blowfish Secure Sockets Layer (SSL)Transport Layer Security (TLS) Advanced Encryption Standard (AES)Digital signatureScenarios:Encryption Algorithm/MethodScenarioBlowfish Since the company is small, this method is cost effective, and Blowfish operates well on mobile processorsTop Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads' primary concern is protecting the data on the smartphones. Select an encryption solution that best