PLS ATTEMpT ALL QUESTIONS WITH NO PLAGIARISM Many cryptographic applications sup
ID: 3698728 • Letter: P
Question
PLS ATTEMpT ALL QUESTIONS WITH NO PLAGIARISM
Many cryptographic applications support a range of different cryptographic algorithms.
(a) Which of the applications discussed in this chapter such as cryptography for wireless local area network, cryptography for mobile telecommunications, cryptography for secure payment card transactions, cryptography for video broadcasting cryptography for identity cards, and cryptography for home users support a range of cryptographic algorithms, rather than recommending a fixed encryption algorithm?
(b) Discuss the pros and cons of supporting a range of cryptographic algorithms in an application.
(c) Why might a relatively ‘weak’ cryptographic algorithm be included amongst a set of supported cryptographic algorithms?
(d) What security issues might arise from including a relatively ‘weak’ cryptographic algorithm in a set of supported cryptographic algorithms?
Explanation / Answer
cryptographic algorithm
A cipher, or cryptographic algorithm, is the methods for adjusting information from a coherent shape (otherwise called plaintext) to an ensured frame (otherwise called ciphertext), and back to the meaningful form.Changing plaintext to ciphertext is known as encryption, though changing ciphertext to plaintext is known as decryption.
Sorts:
1. Triple DES
Triple DES was intended to supplant the first Data Encryption Standard (DES) algorithm,which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the suggested standard and the most generally utilized symmetric algorithmin the business.
2.RSA
RSA is an open key encryption algorithmand the standard for encoding information sent over the internet.It likewise happens to be one of the strategies utilized as a part of our PGP and GPG programs.
3. Blowfish
Blowfish is yet another algorithmintended to supplant DES.This symmetric cipher parts messages into squares of 64 bits and scrambles them independently.
Cons:
If you have fixed encryption algorithm then there may be chance of risk will happen compared to unfixed encryption algorithm.
Pros: It will be easy for developers to develop the algorithm for all the devices in the same manner rather than finding individually where it takes more time.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.