5
RESEARCH PAPER
Final Paper
Sudheer Kumar Poluru
Executive Master of Science in Information Security Systems
University of The Cumberlands
ISOL 535 Cryptography
Dr. Karen Bovell
June 09, 2018
[Type text] [Type text] [Type text]
1
Running Head: FINAL PAPER
Table of Contents Abstract – (Documentation including formatting) Symmetric Encryption Strengths Weaknesses Algorithms Data Encryption Standard (DES) Advanced Encryption Standard Examples in Day to Day Scenario Bluetooth GSM References
Symmetric Encryption
Symmetric Cryptography utilizes a private key based cryptography where a similar key is utilized for encryption and decryption.
Strengths: -
Preserving Confidentiality
Speed
Simplicity
Authenticity
Availability
Weaknesses: -
Theft or Loss of Keys
Key Distribution
Robustness to attacks
Key Increments
Authenticity
.
Algorithms
The symmetric cryptography could be executed utilizing a wide range of calculations. Most generally utilized ones are DES, AES, Blowfish, Serpent and IDEA.
Data Encryption Standard (DES) : -
The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world.
How DES works:
Strengths of DES: -
Weaknesses of DES: -
Advanced Encryption Standard: -
Advanced Encryption Standard (AES) algorithm offers not only the security but also a great speed.
How AES Works:
Strengths of AES: -
Weaknesses of AES: -
Real World Examples: -
References
Fugini, M., & Bellettini, C. (Eds.). (2004). Information security policies and actions in modern integrated systems. IGI Global.
Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 895-934.