Sie sind auf Seite 1von 2

10/31/2013

Davonte Brown

Unit 7 Assignment 1 - Select Appropriate Encryption Algorithms
1. The following algorithms are my recommendations for this companys email concerns:
Secure Sockets Layer (SSL)
Diffie-Hellman key exchange
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Lets just talk about what all you can do with this recommendation for your company. One of the
reasoning is that the RSA algorithm is considered the most common public key encryption algorithm
that can be used for either digital signatures or for encryption. Wow this place seems great its
called The Diffie-Hellman key exchange is not implemented on hardware but used for emails and
Secure Sockets Layer (SSL) offers secure communication between the client and the server.
2. I would recommend using these three encryption methods:
Digital Signature
Advanced Encryption Standard (AES)
Elliptic curve cryptography (ECC)
Here we go on are journey to The Digital Signature and Advanced Encryption Standard (AES),
Digital Signatures are fairly efficient in the use of SHA-1 hash function to compute message digests,
and AES is very secure and will more than likely be used when employees create passwords on the
smartphones. The Elliptic curve cryptography (ECC) algorithm offers a smaller key size which
reduces storage and transmission requirements and it is capable of factoring two or more large prime
factors, making it harder to crack.

10/31/2013
Davonte Brown

3. This is what I would recommend for this company to use to keep the overhead down and still have the
security that they require.
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Secure Sockets Layer (SSL)
Elliptic curve cryptography (ECC)
Wow lets talk about a powerful place the NetSecIT will want to use Secure Sockets Layer (SSL)
for their Internet cryptography. The company can use the RSA encryption algorithm for either digital
signatures or encryption, and if they used it for digital signatures then they have the Elliptic curve
cryptography (ECC) to use for encryption, which is very good. The ECC has been used and
endorsed by the U.S. National Security Agency for protecting information from classified to top
secret using 384-bit keys.
4. I have chosen this particular set of encryption algorithms because you can combine a Symmetric and
Asymmetric Key algorithm to better your encryption. By using the Secure Sockets Layer (SSL) offers
the security for the Web-based applications that will be accessing the internet.
International Data Encryption Algorithm (IDEA)
Elliptic curve cryptography (ECC)
Secure Sockets Layer (SSL)
5. The following algorithms are recommended for Confidential Services Inc.:
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Because it is both strong and fast, qualities that the company is searching for, I chose Advanced
Encryption Standard (AES). The use of RSA will help enforce the security of the AES and the
Secure Sockets Layer (SSL) will provide security for internet access.

Das könnte Ihnen auch gefallen