Need it in 5-6 Hours.I have attached a document here ( its just a outline of document) which found as 100% plagiarism , But i want to complete the document with the topics as provided in attached docu

1

Running Head: FINAL PAPER

Final Paper

Sudheer Kumar Poluru

Executive Master of Science in Information Security Systems

University of The Cumberlands

ISOL 535 Cryptography

Dr. Karen Bovell

June 09, 2018



Table of Contents

Symmetric Encryption 3

Strengths: - 3

Weaknesses: - 3

Algorithms 4

Data Encryption Standard (DES) : - 4

Advanced Encryption Standard: - 4

Real World Examples: - 4

References 5


Symmetric Encryption

Symmetric Cryptography utilizes a private key based cryptography where a similar key is utilized for encryption and decryption.

Strengths: -


Preserving Confidentiality

Speed

Simplicity

Authenticity

Availability

Weaknesses: -

Theft or Loss of Keys

Key Distribution

Robustness to attacks

Key Increments

Authenticity



Algorithms

The symmetric cryptography could be executed utilizing a wide range of calculations. Most generally utilized ones are DES, AES, Blowfish, Serpent and IDEA.

Data Encryption Standard (DES) : -

The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world.

How DES works:

Strengths of DES: -

Weaknesses of DES: -

Advanced Encryption Standard: -

Advanced Encryption Standard (AES) algorithm offers not only the security but also a great speed.

How AES Works:

Strengths of AES: -

Weaknesses of AES: -

Real World Examples: -

References

Fugini, M., & Bellettini, C. (Eds.). (2004). Information security policies and actions in modern integrated systems. IGI Global.

Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security19(5), 895-934.