Need it in 5-6 Hours.I have attached a document here ( its just a outline of document) which found as 100% plagiarism , But i want to complete the document with the topics as provided in attached docu
1
Running Head: FINAL PAPERFinal Paper
Sudheer Kumar Poluru
Executive Master of Science in Information Security Systems
University of The Cumberlands
ISOL 535 Cryptography
Dr. Karen Bovell
June 09, 2018
Symmetric Encryption 3
Strengths: - 3
Weaknesses: - 3
Algorithms 4
Data Encryption Standard (DES) : - 4
Advanced Encryption Standard: - 4
Real World Examples: - 4
References 5
Symmetric Encryption
Symmetric Cryptography utilizes a private key based cryptography where a similar key is utilized for encryption and decryption.
Strengths: -
Preserving Confidentiality
Speed
Simplicity
Authenticity
Availability
Weaknesses: -Theft or Loss of Keys
Key Distribution
Robustness to attacks
Key Increments
Authenticity
.
Algorithms
The symmetric cryptography could be executed utilizing a wide range of calculations. Most generally utilized ones are DES, AES, Blowfish, Serpent and IDEA.
Data Encryption Standard (DES) : -The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world.
How DES works:
Strengths of DES: -
Weaknesses of DES: -
Advanced Encryption Standard: -Advanced Encryption Standard (AES) algorithm offers not only the security but also a great speed.
How AES Works:
Strengths of AES: -
Weaknesses of AES: -
Real World Examples: -References
Fugini, M., & Bellettini, C. (Eds.). (2004). Information security policies and actions in modern integrated systems. IGI Global.
Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 895-934.