ISSC366
Assignment 3
12/23/15
Professor Yongge
1) What is Public-Key Cryptography and why is it important?
The evolution of the Public Key Cryptography started with the innovative
minds of Whitfield Diffe and Martin Hellman. In the year of 1976, the publi

Research on the general internet or in the University Library and find a Cryptography article
online relating to Block Ciphers or Public-Key Cryptography. Summarize the article.
This article started out talking about how within Silicon Valley back in the

Courtney Westrick
1) What is a stream cipher?
To know of a stream cipher, it would be best to know a bit of history about it also. First thing is that it
was invented by Gilbert Vernam in 1917. They were not actually called stream cipher though when it wa

I decided to cover an article about a code-breaking machine being picked up on eBay. The machine
(Lorenz machine) sent encrypted messages between Hitler and his generals. It was sitting in a shed
rotting for decades before being put up for sale. It was fo

1) What is the Data Encryption Standard (DES)?
The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption, (Rouse,
2014). It works because when encrypting and decrypting a message, it uses the same key. Because of
this the s

This article started out talking about how the NSA had been using elliptic curve cryptography.
They swayed standard bodies away from RSA and more towards ECC in the 1990s, (Mimoso,
2015). They recommended it as a solution that would be strong enough to us

1) What is a digital signature?
A digital signature (not to be confused with a digital certificate) is a mathematical technique
used to validate the authenticity and integrity of a message, software, or digital document,
(Rouse, 2014). It is essentially a

1) How is the RSA Cryptosystem used?
The RSA algorithm was invented in 1977 and its name came from Ron Rivest, Adi Shamir, and
Len Adleman. The basic technique of the algorithm was founded in 1973 and kept a secret until
1997 by Clifford Cocks. There was

The article I chose this week talked about Message Authentication Codes (MAC) and using it to
help protect smart homes and buildings. It started out talking about how protecting a home can
be enhanced by doing simple tricks. It is a good idea to do so con

I actually found it a little more difficult this week to find an article. Just about every one
of them only mentioned key establishment once, maybe twice. Since that was the case, I just
went ahead and chose the one that talks about the NSA approving Sams

article online relating to RSA Cryptosystem or the Discrete Logarithm Problem. Summarize.
I chose the article I am doing for this forum because it involves NASCAR and I like it. It started
out talking about how the Circle Sport-Levine Family Racing team w

Research and find a Cryptography article online that interests you. Summarize the
article.
I decided to choose an article about a woman who did private cryptography work during World War II. It
starts out talking about how the woman, Jean (Johnson) Bridge

1) What is Public-Key Cryptography and why is it important?
Public-Key Cryptography was created in 1976 by Whitfield Diffe and Martin Hellman. It
became a big innovation due to it fundamentally altering the encryption and decryption process,
(Understandin

ISSC 366
Assignment 4
12/28/15
Assignment 4
1) How is the RSA Cryptosystem used?
From the reading in chapter 7 in the book, The RSA Cryptosystem is used for the
encryption of small data, which can include key transport, and for also digital signatures
(Pa

ISSC366
12/15/15
1) What is the Data Encryption Standard (DES)?
The data encryption standard is the most popular security block cipher when it comes to
Information assurance. DES proves to be a symmetric cipher which would use the same key it
would use fo

ISSC 366
Assignment 6
1/13/16
1) What are hash functions and why are they important?
From the research that I completed I found out a great in depth view on what Hash
functions are overall. Hash functions are the type of security used in cryptography to
m

ISSC366
Assignment 7
1/20/16
1) What is key establishment and why is it important?
When it comes to key establishment in the world of cryptography, it is the process
that ensures the establishment of two or more shared secret keys (n.d.). Key
establishmen

ISSC 366
Assignment 5
1/6/16
Assignment 5
1) What is a digital signature?
A digital signature is the feature used to go and prove that the sender of a message or
the integrity of a site is true. The definition of the book goes to provide that digital
sign

Hello Class,
When it comes to vulnerabilities in Cryptography, I remember talking about them in
one of my previous classes and I got to say that the article I found today was very
interesting to me.
The article I found relates to the insecurities found in

Week 1 Forum
ISSC 366
I found a rather interesting article where researchers were attempting to design Quantum
Cryptography (QC) systems that can be practically used in a "plug-and-play" manner
with existing telecom infrastructure (Muller et al., 1997). T

Week 2 Forum
ISSC 366
Stream Cipher Cryptography
Cryptography which is the practice of using a key to encrypt data before
transmitting it and the corresponding key to decrypt it on the receiving end is a critical
method of security which is essential for

Week 3 Forum
ISSC 366
Public-key cryptography also known as asymmetric cryptography is a relatively new
form of cryptography that has been rapidly researched and developed as a beneficial form
of encryption. Public-key cryptography is particularly useful

1) What are hash functions and why are they important?
There are three types of cryptography algorithms: secret key, public key, and hash functions.
Unlike secret key and public key algorithms, hash functions, also called message digests or oneway encrypt