This

**preview**has**blurred**sections. Sign up to view the full version! View Full Document<NAME>
NT2580
11 February 2013
NT2580: Unit 7 Select Appropriate Encryption Algorithms
Instructions:
Match common encryption algorithms and methods with the scenarios representing real-world business
applications and requirements.
Common encryption algorithms and methods:
Data Encryption Standard (DES)
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Triple DES
Diffie-Hellman key exchange
International Data Encryption Algorithm (IDEA)
El Gamal encryption algorithm
Carlisle Adams and Stafford Taveres (CAST) algorithm
Elliptic curve cryptography (ECC)
Blowfish
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Digital signature
Scenarios:
1.
Shovels and Shingles is a small construction company consisting of 12 computers that have
Internet access. The company's biggest concern is that a wily competitor will send e-mail
messages pretending to be from Shovels and Shingles in order to get confidential information.
Select an encryption solution that best prevents a competitor from receiving confidential
information and justify the recommendation.
My recommendations for this company’s email concerns are the following algorithms;
•
Rivest, Shamir, and Adleman (RSA) encryption algorithm
•
Diffie-Hellman key exchange
•
Secure Sockets Layer (SSL)
The reasoning for this is that the RSA algorithm is considered the most common public key
encryption algorithm that can be used for either digital signatures or for encryption.
The Diffie-

This is the end of the preview. Sign up to
access the rest of the document.