Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

PLS ATTEMpT ALL QUESTIONS WITH NO PLAGIARISM Many cryptographic applications sup

ID: 3698728 • Letter: P

Question

PLS ATTEMpT ALL QUESTIONS WITH NO PLAGIARISM

Many cryptographic applications support a range of different cryptographic algorithms.
(a) Which of the applications discussed in this chapter such as cryptography for wireless local area network, cryptography for mobile telecommunications, cryptography for secure payment card transactions, cryptography for video broadcasting cryptography for identity cards, and cryptography for home users support a range of cryptographic algorithms, rather than recommending a fixed encryption algorithm?
(b) Discuss the pros and cons of supporting a range of cryptographic algorithms in an application.
(c) Why might a relatively ‘weak’ cryptographic algorithm be included amongst a set of supported cryptographic algorithms?
(d) What security issues might arise from including a relatively ‘weak’ cryptographic algorithm in a set of supported cryptographic algorithms?

Explanation / Answer

cryptographic algorithm

A cipher, or cryptographic algorithm, is the methods for adjusting information from a coherent shape (otherwise called plaintext) to an ensured frame (otherwise called ciphertext), and back to the meaningful form.Changing plaintext to ciphertext is known as encryption, though changing ciphertext to plaintext is known as decryption.

Sorts:

1. Triple DES

Triple DES was intended to supplant the first Data Encryption Standard (DES) algorithm,which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the suggested standard and the most generally utilized symmetric algorithmin the business.

2.RSA

RSA is an open key encryption algorithmand the standard for encoding information sent over the internet.It likewise happens to be one of the strategies utilized as a part of our PGP and GPG programs.

3. Blowfish

Blowfish is yet another algorithmintended to supplant DES.This symmetric cipher parts messages into squares of 64 bits and scrambles them independently.

Cons:

If you have fixed encryption algorithm then there may be chance of risk will happen compared to unfixed encryption algorithm.

Pros: It will be easy for developers to develop the algorithm for all the devices in the same manner rather than finding individually where it takes more time.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote