Sign In
Not register? Register Now!
Pages:
6 pages/β‰ˆ1650 words
Sources:
9 Sources
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Module 4 Case: Cryptography and Computer Forensics

Research Paper Instructions:

Module 4 - Case CRYPTOGRAPHY AND COMPUTER FORENSICS Case Assignment Case 4 is in two parts, cryptography and computer forensics. Part I and Part II require that each part should be completed in 3-5 pages. Part I Research symmetric and asymmetric cryptographic algorithms. Discuss the advantages of disadvantages of symmetric and asymmetric cryptography and why hybrid cryptography is a better option. In writing your paper, use what you have learned from the reading materials as well as your own research into encryption. Your paper should include the following: Definition of the various algorithms Advantages and disadvantages of each algorithm Examples on cryptographic systems that use hybrid technologies. Part II Write about some of the key issues you deem important in computer forensics. In writing your paper, use what you have learned from the reading materials as well as your own research into computer forensics. Your paper should include the following: The difference between computer forensics and traditional forensics Why you choose to discuss the issues of your choice in your paper Assignment Expectations Your paper should be from 6 to 10 pages long. Combine parts I and II into a single report labeling each part accordingly. Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular: Demonstration of your understanding on cryptographic algorithms and computer forensics. Clear presentation of your findings.

Research Paper Sample Content Preview:

Cryptographic and Computer Forensics
Name:
Institution:
Cryptographic and Computer Forensics (Case 4)
Part I
Symmetric and Asymmetric Cryptographic Algorithms
Most people believe that encryption only entails conversion of plaintext digital message to a ciphertext message using the same key for encryption and decryption. However, the truth of the matter is that there is more to encryption than this. As much as this assumption is correct, it only accounts for one form of a cryptographic algorithm, which is the use symmetric algorithm. Symmetric key cryptography is the most widely used algorithm when it comes to digital encryption messages, files, and software and as discussed above, it entails the use of the same public key to conducting both the encryption and decryption of digital messages (Villanueva, 2015). This fact, therefore, implies that the sender of the message should find a way of conveying the public key used for the message encryption to the message receiver or else the recipient of the message might fail to access the sent digital message or files. In most cases, the algorithm that is typically being used for symmetric key cryptography is the Advanced Encryption Standard (AES) (Cobb). This comprises of three forms of AES including AES- 128 that is sufficient to provide a SECRET level of protection to sensitive government information. The other two AES keys are preferred for providing TOP SECRET level of protection.
Besides the symmetric cryptography algorithm, the other form of encryption key algorithm that exists is the asymmetric key cryptography algorithm. Unlike the symmetric key cryptography, asymmetric cryptography entails the use of two different forms of keys for encryption and decryption of the digital message (Microsoft). This, therefore, entails that, two separate keys that are established when using an asymmetric cryptographic algorithm. The first is the private key that the sender of the message uses to encrypt the digital file before sending it to the recipient. However, unlike the case of symmetric cryptographic algorithm where the same key is used for encryption and decryption purposes, asymmetric cryptographic algorithm establishes a different key referred to as the public key that various recipients use for decryption purposes (Villanueva, 2015). The sender does not need to send the encryption key to the recipient as it is the case in the symmetric cryptographic algorithm.
Advantages and Disadvantages of Symmetric and Asymmetric Cryptographic Algorithm
One of the major assumptions that some investigators have heard is that asymmetric key algorithm encryption is tougher to crack compared to symmetric ones. This is probably because the lengths of asymmetric encryptions are longer compared to those of symmetric since they range from 1024 to 2048 while the symmetric ones lie between 128 to 256 (Cobb). However, the truth of the matter is that studies are yet to prove on whether the length of the keys can be used to determining their toughness. Also, experts have recommended that the best way of comparing the pros and cons of these two cryptographic algorithms be by considering their computational requirements as well as their efficiency regarding distribution.
Regarding computation...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!