Identify the public encryption functions


Assignment:

Discussion 1:

The Triple Data Encryption Standards, which refer to symmetric encryption but are an improved form of the DES method, which encrypts the 56-key bit typically, are currently employed in the majority of circumstances. This approach operates by encrypting each block three times with the Triple DES cipher algorithm. ATM PINs are encrypted using this technology. Another method is Twofish, which is a license-free encryption method that ciphers 128 bits of data blocks (Conklin et al., 2018). It is seen as a successor to the Blowfish encryption algorithm. It's worth mentioning that this approach is slower than AES and is used to encrypt files and folders.

Public Key Infrastructure (PKI) is a framework that aids in identifying and distributing public encryption functions. PKI establishes a set of guidelines and practices that are helpful in the setup of the information exchange. Additionally, it aids in guaranteeing that individual system exchanges take place over potentially vulnerable networks (Stapleton & Epstein, 2016). As a result, it is beneficial because it aids in the authentication and verification of identification when interacting. However, there are concerns with using KPI, such as side key misuse and insufficient client data.

Tangible securities have a physical deterrent effect. Closed-circuit television surveillance CCTV is an example of this. CCTV cameras are installed in all corners of the building, making monitoring much easier to carry out. The person in charge of the control room will use these to alert security to any situation resulting in a security breach (Stapleton & Epstein, 2016). The perimeter wall provides additional physical protection by ensuring that anyone entering the premises is examined at a single entry point and cleared before progressing. As a result, the organization can exclusively welcome those who have good intentions, reducing the risk of insecurity.

Discussion 2:

Caesar Cipher impacts on cryptography in different manners. For example, utilizing the short key in the whole cycle will be of extraordinary incentive to the cryptography as it will help in giving security to the data an association (Sanchez, et al., 2016). It is reasonable to utilize if the framework can't utilize any convoluted coding strategies. With arrangement of security to the data, it help in guaranteeing that data is very much protected. Caesar Cipher is significant in giving security to data of an organization. Security for this situation it is given by the calculations which is applied in the information (Sanchez, et al., 2016).

The business environment can be trusted and secured with the use of PKI and the identity of the machines can be verified and the integrity of the transaction is proved ultimately through the process of encryption and decryption as the PKI is based on the digital certificates. Against the hacker the information is protected with the use of PKI and the information is trusted (Russell, 2004).

With the use of PKI, there are several issues and the issues are the security of the root CA and the security of the root CS is considered and it is important and PKI cannot be trusted if there is no trust in root CA. For the management of the entire certificate life cycle, the planning is lack forwarded with PKI deployment mistakes and there is a chance of outage with the poor handling. The keys which are in the user can be detected by hackers by using a variety of techniques and the information can be decrypted by the hacker if the key is matched (Russell, 2004).

To protect the facilities and the assets which are present in the organization physical security is the main objective and to safeguard the employee's physical security is the foremost responsibility. The sensitive and important information within the company cannot be destroyed or stolen and organizations can be protected with the use of physical security (Russell, 2004).

Surveillance

In the organization video surveillance should be placed so that the persons entering into the organization can be observed and with the use of a logbook the entry and exit of the person should be maintained. Within the organization, the surveillance cams should be monitored continuously so that every person within the organization's premises can be observed (Russell, 2004).

Access Control

With the use of the best technology the unauthorized people's access should be identified and unauthorized people cannot enter into the premises with the use of access control only the authorized can have access with the use of various systems like biometrics, facial recognition, and so on (Russell, 2004).

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Identify the public encryption functions
Reference No:- TGS03161186

Now Priced at $15 (50% Discount)

Recommended (94%)

Rated (4.6/5)