Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
3 Sources
Style:
APA
Subject:
Social Sciences
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.32
Topic:

HLS 625 Assignment: Four Objectives of Cryptography

Essay Instructions:

Answer each of the following questions concisely but completely.
Discuss the four objectives of cryptography. Explain how each of these objectives relates to information security management.
Distinguish between symmetrical and asymmetrical encryption. Give examples of symmetric and asymmetric ciphers.
Explain the purpose of digital signature algorithms and hash algorithm.
Discuss message authentication codes and how they relate to the four objectives of cryptography.
Discuss two principles of cryptographic key management.
Explain the difference between stream and block ciphers and when each is best used.
Explain what quantum cryptography is.

Essay Sample Content Preview:

HLS 625 Written Assignment 2
Name
Institute of affiliation
Date
HLS 625 Written Assignment 2
1 Objectives
* Confidentiality of the message. Only the authorized recipient should be able to extract the message content of the cypher. Furthermore, obtaining information about the content of the message is not possible once the cryptographic analysis becomes easier.
* Message integrity. The recipient must be able to determine if the message was altered during the transition.
* Authentication of the sender. The recipient should be able to identify the sender and verify who sent them the message.
* Irrevocability of the sender. It should not be possible to deny the authorship of the message.
2 How the objectives relate to information security management.
* Enhancing confidentiality by ensuring that only authorized recipient access the message so that it is not tempered with. It ensures that the message do not reach wrong people who may expose the message.
* Message integrity ensures that correct information is given and the same received without alteration.
* Authentication of the sender ensures that the information only come from the individuals who are authorized hence cannot insecure information to the company or an organization.
* Irrevocability of the sender determines the generator of the message. One should generate the relevant message needed by the organization.
3 Asymmetric encryption involves public encryption of information. Here, has two keys, secret key and public key. Symmetric encryption involves secret k...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!