- This topic has 9 replies, 5 voices, and was last updated 3 months, 1 week ago by
Eugene Estes.
-
AuthorPosts
-
-
February 14, 2022 at 9:00 am #62367
Jessica Jagerson
KeymasterExplain at least three different encryptions and when it would be appropriate to use them.
-
November 20, 2025 at 4:38 pm #111366
Matthew Beaver
ParticipantEncryption is crucial for securing data and communications, and there are various encryption methods suited for different purposes. Here are three different types of encryption and their appropriate use cases:
1. **Symmetric Encryption**:
– **Description**: Symmetric encryption uses the same key for both encryption and decryption. This means that both the sender and the receiver must share and keep the key secure.
– **Example Algorithms**: AES (Advanced Encryption Standard), DES (Data Encryption Standard), and RC4.
– **When to Use**: It is appropriate for situations where there is a secure method to share the key between parties. Common use cases include encrypting files on a disk, securing data transfers within a closed system (like internal corporate networks), or during secure communications when the key can be exchanged in person or through a secure channel.2. **Asymmetric Encryption**:
– **Description**: Asymmetric encryption uses a pair of keys: a public key (which can be shared openly) and a private key (which is kept secret). Data encrypted with the public key can only be decrypted with the corresponding private key.
– **Example Algorithms**: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
– **When to Use**: It’s useful in scenarios like digital signatures, secure email (like PGP), and for establishing secure connections in protocols like HTTPS. Asymmetric encryption is also essential for securely exchanging symmetric keys over an insecure channel.3. **Hashing**:
– **Description**: While not a form of encryption per se, hashing transforms data into a fixed-size string of characters (the hash) which is unique to the input data. Hashing is typically a one-way function, meaning the original data cannot be easily retrieved from the hash.
– **Example Algorithms**: SHA-256 (Secure Hash Algorithm 256-bit), MD5 (Message Digest Algorithm 5).
– **When to Use**: It’s appropriate for storing passwords securely, verifying data integrity (e.g., to check if files have been altered), or in digital signatures where you want to confirm that a message has not been tampered with. Due to its one-way nature, it’s primarily used for integrity checks rather than confidentiality.In summary, choosing the right type of encryption depends on the specific needs of your application, such as the required level of security, the nature of the data, and how keys will be managed and exchanged.
-
November 24, 2025 at 3:32 pm #111438
Hannah Street
ParticipantHi Matthew! Your discussion post had a lot of good details about each one of the types of encryptions. You were able to cover the main overviews of different kinds of encryptions. Symmetrical and Asymmetrical both play an important role when looking at encryptions and serve different purposes. Your discussion post was well written. Good job!
-
-
November 21, 2025 at 2:45 pm #111390
Hannah Street
ParticipantThere are a few different kinds of encryptions and the three that I will be covering are Diffie Hellman encryption algorithm, Blowfish, and RSA. Encryptions fall into one of two categories, either the type of encryption is symmetrical or asymmetrical. The first type of encryption that I will be discussing is the Diffie Hellman encryption algorithm which is a public exchange method that shares private keys. This method should not be used over a long time for things like stored data but rather used for short periods of communication. Another type of encryption is Blowfish. This type of encryption is symmetrical encryption. It is free and used for a number of different things like file encryption and password management. It is not always reliable as it can be easily intercepted. RSA or Rivest-Shamira-Adleman it is used for signature verification and decryption. Each one of these types of encryptions are used for specific uses, and they can vary between the types of encryptions. (Mutune, 2025)
References:
Mutune, G. (2025, January 12). 10 common encryption methods in 2025. CyberExperts.com. https://cyberexperts.com/common-encryption-methods/-
November 23, 2025 at 1:27 pm #111408
Matthew Beaver
ParticipantThe text provides a concise overview of three encryption methods: Diffie-Hellman, Blowfish, and RSA, along with their respective categories of symmetric and asymmetric encryption.
1. **Diffie-Hellman Encryption Algorithm**: The explanation captures the essence of this method being a public exchange mechanism for sharing private keys, but it would be helpful to elaborate on how it actually works. Additionally, emphasizing its suitability for short-lived communications rather than long-term storage is a valuable point.
2. **Blowfish**: It’s good that the text identifies Blowfish as a symmetric encryption method and highlights its applications, such as file encryption and password management. However, mentioning its vulnerabilities to interception could be expanded upon with examples or potential risks to provide a deeper understanding.
3. **RSA (Rivest-Shamir-Adleman)**: The mention of RSA focuses on its use for signature verification and decryption, which is accurate. However, it might benefit from a brief explanation of how RSA operates, particularly why it’s considered secure and its role in public key infrastructure.
Overall, the text effectively summarizes the key features of each encryption method and their suitable applications. Including specific use cases and potential limitations could enhance the understanding for readers. Additionally, ensuring correct capitalization and spelling (e.g., “Diffie-Hellman”) would improve professionalism.
Lastly, a reference to the year of publication in the citation is a nice touch, showing that the information is current. Overall, it’s a solid foundation that could be developed further with more details and examples.
-
-
November 21, 2025 at 8:50 pm #111395
Marisa Ross
ParticipantWEP, or Wired Equivalent Privacy, was part of the original Wi-Fi standard, using the RC4 encryption cipher, but it quickly proved to have major flaws. WPA, or Wi-Fi Protected Access, was introduced as part of the draft 802.11i standard and rushed into use when WEP’s weaknesses became clear. WPA2 is the final version, based on the completed 802.11i standard, with mandatory 128-bit encryption using the strong Advanced Encryption Standard cipher. WPA and WPA2 can be split into subtypes based on how encryption keys are created and shared, which impacts both joining the network and overall security. WPA-Personal, or pre-shared key, uses a passphrase of 8 to 63 ASCII characters manually given to each authorized user, making it great for small networks if the password is strong. WPA-Enterprise, also known as 802.1x mode, requires clients to authenticate with an external server, typically RADIUS-based, using a username and password. WPS, or Wi-Fi Protected Setup, was designed to simplify network access management for non-technical home users.
-
November 23, 2025 at 1:28 pm #111409
Matthew Beaver
ParticipantThe text provides a concise overview of the evolution of Wi-Fi security protocols, highlighting the key differences and improvements from WEP to WPA and WPA2. It effectively explains the vulnerabilities of WEP and the subsequent introduction of WPA as a necessary solution. The mention of WPA2’s reliance on strong 128-bit encryption using the Advanced Encryption Standard (AES) highlights its robustness compared to its predecessors.
The distinction between WPA-Personal and WPA-Enterprise is well-articulated, showcasing the varying needs of different network environments. It emphasizes the simplicity of WPA-Personal for small networks with a shared passphrase and the added security of WPA-Enterprise, which utilizes external authentication.
Additionally, the introduction of WPS is relevant as it addresses the challenges faced by non-technical users in managing network access, reinforcing the importance of user-friendly solutions in network security.
Overall, the text is informative, clear, and logically structured, offering a strong foundation for understanding Wi-Fi security protocols.
-
December 1, 2025 at 5:52 pm #111601
Eugene Estes
ParticipantYour presentation offers a structured and thorough account of the progression of Wi-Fi security protocols, clearly illustrating how each enhancement rectified the deficiencies of its predecessor. You describe how Wired Equivalent Privacy (WEP), despite being the first Wi-Fi security method, rapidly became ineffective due to its flawed RC4 encryption, thereby facilitating the emergence of more sophisticated standards. Your explanation of WPA and WPA2 indicates a comprehensive grasp of the evolution of encryption technology, especially with WPA2, which utilizes the more secure AES algorithm. Moreover, you provide significant insight into the operational differences between WPA-Personal and WPA-Enterprise, highlighting how the method of key distribution influences the usability and security of the network across various settings. The incorporation of the WPS feature and its role in facilitating access for home users concludes your discourse by acknowledging user-friendly solutions alongside protocols that are identical to those employed in companies (Frazier, 2024). Your work is generally well-structured, thorough, and demonstrates a solid grasp of wireless security principles.
-
-
November 24, 2025 at 4:55 pm #111441
Eugene Estes
ParticipantA technique for protecting data is encryption, which transforms data into a format that is unintelligible without the right decryption key. It is frequently used to safeguard private information in systems for authentication, storage, and communication (Kaushik et al., 2023). The three main forms of encryption are shown here, along with the circumstances in which each is most suitable..
1. Symmetric Encryption (e.g., AES)
Symmetric encryption encrypts and decrypt data using a single common key. Sarkar et al., (2024) says because of its speed and robust security, AES (Advanced Encryption Standard) is the most widely used symmetric algorithm.
Useful Applications: AES can be used to encrypt big files, safeguard hard drives, preserve database data, and secure wireless networks. It works best in settings where the same secret key may be safely shared by both parties.
2. Asymmetric Encryption (e.g., RSA)
Two keys are used in asymmetric encryption: a private key for decryption and a public key for encryption. One of the most popular algorithms in this area is RSA .
Use: Digital signatures, encrypted communications, secure key exchange, and creating secure web connections like HTTPS are all suitable applications for RSA (Banoth & Regar, 2023). It works well in circumstances where parties who have never met before need to communicate securely.
3. Hashing (e.g., SHA-256)
Data is transformed into an irreversible, fixed-length code using hashing. Abdullahi et al., (2023) suggests that instead of concealing information, it is utilized to confirm it.SHA-256 is used appropriately for storing passwords, verifying file integrity, confirming block-chain transactions, and making sure that data hasn’t been tampered with.-
November 24, 2025 at 9:14 pm #111450
Marisa Ross
ParticipantYou clearly explained the differences between symmetric encryption, asymmetric encryption, and hashing, along with practical examples for each. I especially liked how you pointed out that symmetric encryption, like AES, is fast and efficient when both parties can securely share a key, such as for encrypting files or databases. Your summary of asymmetric encryption with RSA was also spot-on. It’s ideal for secure communications between people who haven’t exchanged keys beforehand, which is crucial for things like HTTPS and digital signatures. Your take on hashing was great too, it’s not about hiding data, but about verifying integrity, like checking passwords or ensuring files haven’t been tampered with.
-
-
-
AuthorPosts
- You must be logged in to reply to this topic.



