ISSC366
Assignment 3
12/23/15
Professor Yongge
1) What is Public-Key Cryptography and why is it important?
The evolution of the Public Key Cryptography started with the innovative
minds of Whitfield Diffe and Martin Hellman. In the year of 1976, the publi

Running head: Assignment 2 1
Assignment 2
ISSC366
Prof. Yongge Wang
ASSIGNMENT 2
2
Assignment 2
What is the Data Encryption Standard (DES)?
Data Encryption Standard, or DES, is a cryptographic algorithm utilized in many
different applications. This has be

Running head: Assignment 3 1
Assignment 3
ISSC366
Prof. Yongge Wang
ASSIGNMENT 3
2
Assignment 3
What is Public-Key Cryptography and why is it important?
Public Key Cryptography was created by Whitfield Diffe and Martin Hellman during 1976.
The goal was to

1
WEEK 7 ASSIGNMENT
Week 6 Assignment
Juan C. De Alba
American Public University Systems
Professor Yongge Wang
ISSC 366
1) What is key establishment and why is it important?
2
WEEK 7 ASSIGNMENT
Key establishment is when a shared secret between parties is

1
SECURITY BY WAY OF CRYPTOGRAPHY
Security by way of Cryptography
Juan C. De Alba
American Public University Systems
Professor Yongge Wang
ISSC 366
2
SECURITY BY WAY OF CRYPTOGRAPHY
INTRODUCTION
Many companies rely on computers and the internet to communi

1) What is Public-Key Cryptography and why is it important?
Public-Key Cryptography was created in 1976 by Whitfield Diffe and Martin Hellman. It
became a big innovation due to it fundamentally altering the encryption and decryption process,
(Understandin

Research and find a Cryptography article online that interests you. Summarize the
article.
I decided to choose an article about a woman who did private cryptography work during World War II. It
starts out talking about how the woman, Jean (Johnson) Bridge

article online relating to RSA Cryptosystem or the Discrete Logarithm Problem. Summarize.
I chose the article I am doing for this forum because it involves NASCAR and I like it. It started
out talking about how the Circle Sport-Levine Family Racing team w

Research on the general internet or in the University Library and find a Cryptography article
online relating to Block Ciphers or Public-Key Cryptography. Summarize the article.
This article started out talking about how within Silicon Valley back in the

Courtney Westrick
1) What is a stream cipher?
To know of a stream cipher, it would be best to know a bit of history about it also. First thing is that it
was invented by Gilbert Vernam in 1917. They were not actually called stream cipher though when it wa

I decided to cover an article about a code-breaking machine being picked up on eBay. The machine
(Lorenz machine) sent encrypted messages between Hitler and his generals. It was sitting in a shed
rotting for decades before being put up for sale. It was fo

1) What is the Data Encryption Standard (DES)?
The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption, (Rouse,
2014). It works because when encrypting and decrypting a message, it uses the same key. Because of
this the s

This article started out talking about how the NSA had been using elliptic curve cryptography.
They swayed standard bodies away from RSA and more towards ECC in the 1990s, (Mimoso,
2015). They recommended it as a solution that would be strong enough to us

1) What is a digital signature?
A digital signature (not to be confused with a digital certificate) is a mathematical technique
used to validate the authenticity and integrity of a message, software, or digital document,
(Rouse, 2014). It is essentially a

1) How is the RSA Cryptosystem used?
The RSA algorithm was invented in 1977 and its name came from Ron Rivest, Adi Shamir, and
Len Adleman. The basic technique of the algorithm was founded in 1973 and kept a secret until
1997 by Clifford Cocks. There was

The article I chose this week talked about Message Authentication Codes (MAC) and using it to
help protect smart homes and buildings. It started out talking about how protecting a home can
be enhanced by doing simple tricks. It is a good idea to do so con

I actually found it a little more difficult this week to find an article. Just about every one
of them only mentioned key establishment once, maybe twice. Since that was the case, I just
went ahead and chose the one that talks about the NSA approving Sams

1) What is a stream cipher?
Stream ciphers will encrypt 1 bit of plaintext at a time. There are pseudorandom bits that are used as
the key and is generally secure if the generator of the bits is unpredictable.
2) Describe the different types of stream cip

Running head: DATA ENCRYPTION: WHAT IT IS
JAY 1
Data Encryption: What is it, How it is Used, Future Technology
10/30/16
Prof. Stewart
APUS ISSC431 Database Security Systems
Abstract
DATA ENCRYPTION: WHAT IT IS, HOW IT IS USED
JAY 2
The main point to this

ISSC366
Week 4 Assignment
10/01/16
1. How is the RSA Cryptosystem used?
RSA Cryptosystem is an asymmetric public key encryption which is
utilized for securing sensitive data which is sent over an insecure network. RSA
should be utilized as a contributor c

ISSC 366
Assignment 4
12/28/15
Assignment 4
1) How is the RSA Cryptosystem used?
From the reading in chapter 7 in the book, The RSA Cryptosystem is used for the
encryption of small data, which can include key transport, and for also digital signatures
(Pa

ISSC366
12/15/15
1) What is the Data Encryption Standard (DES)?
The data encryption standard is the most popular security block cipher when it comes to
Information assurance. DES proves to be a symmetric cipher which would use the same key it
would use fo

ISSC 366
Assignment 6
1/13/16
1) What are hash functions and why are they important?
From the research that I completed I found out a great in depth view on what Hash
functions are overall. Hash functions are the type of security used in cryptography to
m

ISSC366
Assignment 7
1/20/16
1) What is key establishment and why is it important?
When it comes to key establishment in the world of cryptography, it is the process
that ensures the establishment of two or more shared secret keys (n.d.). Key
establishmen

ISSC 366
Assignment 5
1/6/16
Assignment 5
1) What is a digital signature?
A digital signature is the feature used to go and prove that the sender of a message or
the integrity of a site is true. The definition of the book goes to provide that digital
sign

Hello Class,
When it comes to vulnerabilities in Cryptography, I remember talking about them in
one of my previous classes and I got to say that the article I found today was very
interesting to me.
The article I found relates to the insecurities found in

Week 1 Forum
ISSC 366
I found a rather interesting article where researchers were attempting to design Quantum
Cryptography (QC) systems that can be practically used in a "plug-and-play" manner
with existing telecom infrastructure (Muller et al., 1997). T

Week 2 Forum
ISSC 366
Stream Cipher Cryptography
Cryptography which is the practice of using a key to encrypt data before
transmitting it and the corresponding key to decrypt it on the receiving end is a critical
method of security which is essential for

Week 3 Forum
ISSC 366
Public-key cryptography also known as asymmetric cryptography is a relatively new
form of cryptography that has been rapidly researched and developed as a beneficial form
of encryption. Public-key cryptography is particularly useful

ISSC366
Week 4 Assignment
9/30/16
1. How is the RSA Cryptosystem used?
RSA Cryptosystem is an asymmetric public key encryption which is
utilized for securing sensitive data which is sent over an insecure network. RSA
should be utilized as a contributor ci