Q1: DES (data encryption standard)
It is a symmetric- key block cipher which is developed by NIST (National Institute of standard and technology).
Strengths of DES: lies on two facts
Weakness: the design of the cipher has a weakness
Q2: Three DES
Original DES was replaced by new triple DES which uses three keys including 56 bits each.
Strength
Weakness
Q3: AES (Advanced Encryption Standard)
It is an algorithm, trusted by various organizations as the standard. Commonly used block cipher.
Strength
Weakness
Q4: RC4
It is a shared key stream cipher algorithm which requires a secure exchange of shared keys.it uses length keys from 1 to 256 bits. It is developed by Ronald Rivest.
Strength
Weakness
Q5: SHA
Belongs to the family of cryptographic functions which is designed to keep the data safe. It transforms the data by using a hash function.
Strengths
Weakness
Q6: MD5
It is a hashing algorithm with one way cryptographic function which accepts any length and changes it to a fixed length value for authentication of the original message.
Strength
Weakness
Q7: PKI (public key infrastructure)
Distribution and identification of public encryption keys have been supported by PKI. It allows users to securely transfer data over the internet. It consists of software, hardware, and policies.
Strength
Weakness
Q8: PGP (pretty good privacy)
It is a popular program that is developed by Philip R. Zimmermann to encrypt and decrypt electronic mail on the internet. It also used to authenticate messages by using digital signatures.
Strength
Weakness
It is an encryption algorithm which can be a replacement for other algorithms like DES or IDEA. It uses same keys for both encryption and decryption. It is the symmetric block cipher developed by Bruce Blowfish.
Strength
Weakness
Q10: Access control permission (ACP)
Access control permission is a strategy to enhance the security of network used in private organizations. This protocol stops the availability of network to unauthorized devices.
Strength
Weakness
Q11: Symmetric encryption
It is the simplest encryption which includes an only single private key to cipher and deciphers the information
Strength
Weakness
Asymmetric encryption
It is a public key cryptography method which uses two keys for encryption of a plain text.
Strength
Weakness
One-way encryption
It is also known as one way hash function. It can be difficult to reverse the encryption and to find two strings with same hash value.
Strength
Weakness
Q12: Timestamps
It is a computer recorded current time of an event. By using some mechanisms like NTP (network time protocol), a computer manages to maintain the current time.
Strength
Weakness
Q13: Access control permission (ACP)
Access control permission is a strategy to enhance the security of network used in private organizations. This protocol stops the availability of network to unauthorized devices.
Strength
Weakness
Message digits are also called the one-way hash function. The functions of message digits distill the information within a file into one large number which is typically 128-256 bits long.
Strength
Weakness
Q15: Replay security
The replay security or anti-replay protocols are a part of IETF and internet protocol security. By using this protocol it is ensured that for an attacker it will not be possible to make changes in message packets.
Strength
Weakness
It was developed for the wireless network and aimed to provide security level. In 1999 it was accepted as Wi-Fi security.
Strength
Weakness
WPA (Wi-Fi Protected Access)
It was an enhancement of WEP. For keys and generations of certificates, the authentication server is used to in WPA.
Strength
Weakness
WPA2
It was an improved version of WPA, introduced in 2004.
Strength
Weakness
Q17: WPA
Already discussed above in Question 16
Q18: WPA2
Already discussed above in Question 16
Top 5 encryptions are found to be strong enough to use for IT Works on the basis of key length used and efficient security ability against the hackers attacks.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download