NT2580, Week 7 Text Sheet 2 - <NAME> NT2580...

NT2580, Week 7 Text Sheet 2
Download Document
Showing pages : 1 of 3
This preview has blurred sections. Sign up to view the full version! View Full Document
<NAME> NT2580 11 February 2013 NT2580: Unit 7 Select Appropriate Encryption Algorithms Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange International Data Encryption Algorithm (IDEA) El Gamal encryption algorithm Carlisle Adams and Stafford Taveres (CAST) algorithm Elliptic curve cryptography (ECC) Blowfish Secure Sockets Layer (SSL) Advanced Encryption Standard (AES) Digital signature Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. My recommendations for this company’s email concerns are the following algorithms; Rivest, Shamir, and Adleman (RSA) encryption algorithm Diffie-Hellman key exchange Secure Sockets Layer (SSL) The reasoning for this is that the RSA algorithm is considered the most common public key encryption algorithm that can be used for either digital signatures or for encryption. The Diffie-
Background image of page 1
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.