Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
subject: CryptographyQuestion 1 :Using class materials or open web credible resources, discuss the fundamental information security services that cryptography provides. Discuss the perceived weakness
subject: Cryptography
Question 1 :
Using class materials or open web credible resources, discuss the fundamental information security services that cryptography provides. Discuss the perceived weaknesses and strengths (maximum 250 words) References and in-text citations must be APA compliant
Question 2:
Discuss the notion of keys in cryptography.
Is a block better than a stream?
Please note, the maximum number of words – 250.
References and in-text citations must be APA compliant.
- @
- 1030 orders completed
- ANSWER
-
Tutor has posted answer for $15.00. See answer's preview
******************** ************* ******** of ************************ ** done to ensure **** ******* data is ******* ** ******** ************ algorithms ******** ** ******** vital *********** ******** services **** ** *** *********** ******** ******** *** confidentiality **** ********* ** **** ** authentication Confidentiality ******* **** ************ *********** do *** access *********** **** ********* ** *** ***** **** ****** when there ** *** ************** ** *** *********** ******** to the **** *** ******* ******* **** ***** ** * ***** ** detecting ***** ** ************ in ** ************ ****** ******* ************** *** also be done ** * confirmation from the ******** **** *** data ******** is **** * ******** ****** (Kim 2017) This ****** assurance ** *** ****** ** *** ********** linked to *** ************** *** ********* ** CryptographyThrough the *********** services ******* ** ************ ** ** ******* **** ********** *** ** conducted **** ******** by *** *** of ******** ******* ** a manner **** facilitates effectiveness *** ********** However there *** ********** over information **** ** * ********** **** **** the **** is ******** ********* ********** when ********* **** ******** *** computer ******* *** ***** ************ ** **** ************ ** ** **** due ** ******* **** the poor design ** ******* (Kim ***** ********* infrastructure must ** ******** ****** ** * considerable ************ ***** ****** of keys in ************* ************* *** refers ** **** **** ******** ** locking or ********* ** the cryptographic ********* ************* functions *** but *** ******* ** ********** authentication ** well ** ************* **** *** ****** and variable ** **** ************ ** ************** *** **** **** with * cryptographic ********* ** ensure **** **** produce a ******** ********** *** *** ***** are measurable ** **** Bigger **** ********* to **** security ** *** ciphertext ***** *** ****** *** ************ **** However **** *** unrelated ** *** strength ******* ***** & **** ***** For ******** a conventional ****** key has * strength ** ****** 1024-bit ****** key ** the other **** * ******** ****** *** ** ********* equivalent ** * **************** *** *** ***** ******* is ** ********* formIs a ***** ****** **** * *********** are *********** as symmetric ciphers However ****** ******* **** ** ******** infinite cryptographic ********** *** ********* key streams *** ******** in encrypting *** **** ** * **** **** ** ** ******** ** *** ***** ciphers which **** ** work ** ****** ****** ** **** ** a **** *** ******* combines **** ****** *** ********** ******** * ******* that block ****** is ****** than ****** because ** ** ********* *** ** ******** ** *** implementation ** ************* permutation of * ***** number ** *** sequences ********** ***** The various ***** ** ************* ********* makes ** * ****** ****** **** *** stream ***** ** specialized for **** ********** ********************************** W ****** ************ *** ******* ********* ********** *** ******** *** 92-95) ***** ****** ****** PearsonAnanth P ***** * ***** **** * ***** ****** Cryptography **** ******* ** ****** International ********** on the ****** and Applications ** ************* Techniques (pp 445-472) ******** ******* * ****** Cryptography: * *** Open ****** Journal Cryptography **** *