Close

Reply To: OCU ISSO D Week 02 Lesson 07 Discussion

#85714
Kevin Mehok
Participant

IST3100 Information Systems Security Officer
Week Two Lesson 7
Kevin Mehok

Hey Class,

Symmetric Encryption is the most basic and old method of encryption (Hera, 2021). It uses only one key for the process of both the encryption and decryption of data (Hera, 2021). Thus, it is also known as Single-Key Encryption (Hera, 2021).

A few basic terms in Cryptography are as follows:

Plain Text: original message to be communicated between sender and receiver (Hera, 2021).

Cipher Text: encoded format of the original message that cannot be understood by humans.
Encryption (or Enciphering): the conversion of plain text to cipher text (Hera, 2021).

Decryption (or Deciphering): the conversion of cipher text to plain text, i.e., reverse of encryption (Hera, 2021).

The Symmetric Cipher Model:
A symmetric cipher model is composed of five essential parts:
1. Plain Text (x): This is the original data/message that is to be communicated to the receiver by the sender (Hera, 2021). It is one of the inputs to the encryption algorithm (Hera, 2021).

2. Secret Key (k): It is a value/string/textfile used by the encryption and decryption algorithm to encode and decode the plain text to cipher text and vice-versa respectively (Hera, 2021). It is independent of the encryption algorithm. It governs all the conversions in plain text (Hera, 2021). All the substitutions and transformations done depend on the secret key (Hera, 2021).

3. Encryption Algorithm (E): It takes the plain text and the secret key as inputs and produces Cipher Text as output (Hera, 2021). It implies several techniques such as substitutions and transformations on the plain text using the secret key (Hera, 2021).

E(x, k) = y

4. Cipher Text (y): It is the formatted form of the plain text (x) which is unreadable for humans, hence providing encryption during the transmission (Hera, 2021). It is completely dependent upon the secret key provided to the encryption algorithm (Hera, 2021). Each unique secret key produces a unique cipher text (Hera, 2021).

5. Decryption Algorithm (D): It performs reversal of the encryption algorithm at the recipient’s side (Hera, 2021). It also takes the secret key as input and decodes the cipher text received from the sender based on the secret key. It produces plain text as output (Hera, 2021).

D(y, k) = x

References:

Hera, A (2021) https://www.geeksforgeeks.org/symmetric-cipher-model/

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!