5

RESEARCH PAPER

Final Paper

Sudheer Kumar Poluru

Executive Master of Science in Information Security Systems

University of The Cumberlands

ISOL 535 Cryptography

Dr. Karen Bovell

June 09, 2018

[Type text] [Type text] [Type text]

1

Running Head: FINAL PAPER

Table of Contents Abstract – (Documentation including formatting) Symmetric Encryption Strengths Weaknesses Algorithms Data Encryption Standard (DES) Advanced Encryption Standard Examples in Day to Day Scenario Bluetooth GSM References

Symmetric Encryption

Symmetric Cryptography utilizes a private key based cryptography where a similar key is utilized for encryption and decryption.

Strengths: -

Preserving Confidentiality

Speed

Simplicity

Authenticity

Availability

Weaknesses: -

Theft or Loss of Keys

Key Distribution

Robustness to attacks

Key Increments

Authenticity

Algorithms

The symmetric cryptography could be executed utilizing a wide range of calculations. Most generally utilized ones are DES, AES, Blowfish, Serpent and IDEA.

Data Encryption Standard (DES) : -

The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world.

How DES works:

Strengths of DES: -

Weaknesses of DES: -

Advanced Encryption Standard: -

Advanced Encryption Standard (AES) algorithm offers not only the security but also a great speed.

How AES Works:

Strengths of AES: -

Weaknesses of AES: -

Real World Examples: -

References

Fugini, M., & Bellettini, C. (Eds.). (2004). Information security policies and actions in modern integrated systems. IGI Global.

Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security19(5), 895-934.

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com