OCU C)OST B Discussion Lesson 05
Tagged: Encryption
- This topic has 8 replies, 6 voices, and was last updated 8 months, 2 weeks ago by
Latoya Stoudmire.
-
AuthorPosts
-
-
November 20, 2023 at 12:07 pm #91932
Manny Varela
KeymasterExplain at least three different encryptions and when it would be appropriate to use them.
-
September 8, 2024 at 1:49 am #97950
Trae Johnson
ParticipantThree Encryption Methods are symmetric, asymmetric, and hash functions, each play a vital role with their application in information technology. Determining which one is to be used depends on the nature of specific security requirements. Whether it be for speed, key exchange, or integrity verification of key data. The efficient application of these encryption methods will make certain that data confidentiality, integrity, and authenticity are guaranteed in several applications.
1. Symmetric Key Encryption
Symmetric key encryption, also known as private key encryption, is a process in which the same key is used to encrypt and decrypt data. Some of the generally utilized symmetric encryption algorithms are Advanced Encryption Standard, Data Encryption Standard, and Triple DES. Among them, AES is utilized because of its efficiency and security to protect sensitive data of customers.Symmetric encryption is appropriate in the encryption of large volumes of data, since it has a relatively fast processing speed. It is applied in the encryption of data at rest, such as on hard drives and in databases. Applications include file system security, database encryption, and data transfer within secure networks where both sender and receiver share the secret key. However, symmetric encryption requires a secure method for key exchange, which might be challenging to realize.
2. Asymmetric Key Encryption
Asymmetric key encryption, or public key encryption, involves a pair of keys: one for the actual encryption, a so-called public key, and another for its decryption, a private key. This hence provides better security since the public key can be distributed without worrying about its secrecy while the private key remains safe. The common algorithms used in this regard are RSA, or Rivest-Shamir-Adleman, ECC or Elliptic Curve Cryptography, and Diffie-Hellman key exchange.Asymmetric encryption is used in applications that require the exchange of keys over an insecure network. It is widely used for securing e-mail through PGP/GPG, for establishing secure web connections, SSL/TLS, and for digital signatures for authentication and integrity verification, among others, in e-commerce and other online transactions. Asymmetric encryption is much slower than symmetric encryption. It is generally used with symmetric encryption so as to take advantage of both security and efficiency.
3. Hash Functions
Hash functions refer to those forms of cryptographic encryption that convert input data into a fixed-size hash value representing the unique contribution of that data. The most common hash functions include SHA-256, or Secure Hash Algorithm 256-bit, and MD5, or Message Digest 5. As opposed to all other forms of encryption, hash functions are one-way; once an instance is committed to a hash, it is impossible to use the hash function itself to determine the original data in any instance, as elaborated by Schneier (2015).Appropriate Usage:
They are primarily employed in ensuring data integrity and not necessarily in encrypting the data itself. They ensure that data, even passwords or files, are not tampered with during transfer. Another equally important application where hash functions are put into work is digital signatures, message authentication codes, and blockchains. All these involve ensuring data integrity and verification. -Ferguson, Schneier, & Kohno, 2010.References
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley.Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography (3rd ed.). CRC Press.
Menezes, A. J., Vanstone, S. A., & Oorschot, P. C. (2018). Handbook of applied cryptography. CRC Press.
Paar, C., & Pelzl, J. (2010). Understanding cryptography: A textbook for students and practitioners. Springer.
Schneier, B. (2015). Applied cryptography: Protocols, algorithms, and source code in C, 20th anniversary ed., Wiley.
Stallings, W. (2017). Cryptography and network security: Principles and practice, 7th ed., Pearson.
-
September 18, 2024 at 5:25 pm #98071
Addison West
ParticipantHi there Trae,
I really enjoyed reading your discussion for this week! I’m always excited to learn more about different types of encryptions, especially when it comes to securing our data. Your insights on asymmetric encryption and how it uses different keys to protect information are fascinating. Thank you for sharing your knowledge. I’m looking forward to learning even more from you in the future!
-
-
September 15, 2024 at 11:14 am #98026
Erin Kesterson
ParticipantThere is many different types but the most common ones are Symmetric which is also know for a hidden key or a secret key Encryption this is mostly used for mobile devices some uses it on computers. The purpose for this is so that if you’re in somewhere and people are trying to get ur passwords or pull up messages they won’t be able to because symmetric is between your device and the device you are connected to.
Asymmetric Encryption it is nothing like Symmetric that uses one key. Asymmetric uses different keys to lock the passage into another device. That way only the key hold and the one other person can pull and perform actions and have the access to the advancement of functions it’s a lot like the RSA and ECC.
Hashing is a unique identifier, and it transforms data size and length that is fixed to an output known as hash value. it processes though a complex procedure and produces a distinct output for input data.-
September 18, 2024 at 5:19 pm #98070
Addison West
ParticipantHi Erin, It’s great to hear from you! I’m excited to learn more about the different types of encryption. I’m especially intrigued by the concept of asymmetric encryption and how it uses different keys to secure information. Thanks for sharing your insights. I’m looking forward to learning more from you in the future.
-
-
September 18, 2024 at 5:01 pm #98068
Addison West
ParticipantAdvanced Encryption Standard (AES) is one of the most well-known and used encryption methods for finding sensitive data. It’s particularly suitable for encrypting data at rest, such as files stored on hard drives or databases. AES is highly secure and efficient, making it ideal for applications where data security is critical, like financial transactions, personal data storage, and government communications.
Rivest-Shamir-Adleman (RSA) encryption is commonly used for secure data transmission over the internet. It plays a crucial role in digital signatures and SSL/TLS certificates, which are essential for establishing secure connections. RSA is appropriate for applications that require secure key exchange and digital signatures, such as email encryption, secure web browsing (HTTPS), and VPN connections.
Elliptic Curve Cryptography (ECC) is another powerful encryption method used in environments where computational power and battery life are limited, such as mobile devices and IoT devices. ECC provides strong security with shorter key lengths, making it efficient for devices with limited resources. Each of these encryption methods has its own strengths and is appropriate for different scenarios based on specific security needs and resource constraints.
References:
Human Henrick, February 2023, Types of Encryptions [Explanations, Examples, Significance]-
September 18, 2024 at 5:53 pm #98078
Jessica Belknap
ParticipantAddison,
I really appreciate the thorough and well-researched references you included in your study. The use of examples from “Human Henrick Encryptions” really helped to deepen our understanding of encryption keys.
-
-
September 18, 2024 at 5:51 pm #98076
Jessica Belknap
ParticipantThere are three encryption methods: symmetric, Asymmetric, and Hashing. Symmetric encryption, also known as secret key Encryption, is a widely used method. It operates on the principle of using a single key to encrypt and decrypt data. This key is crucial for both processes as a random string of bits by a computer. Visualize the key as a specific set of instructions to create a secret language that transforms the original data. Replace each alphabet letter with another letter based on the key, and when you’re writing a message, you use this secret language to transform each letter according to the key. Asymmetric Encryption uses two keys, one for public encryption and the other for private encryption. Hashing Encryption is a unique process of transforming any data, regardless of size, to a unique output known as a hash value.
sealpath.com
-
September 18, 2024 at 9:07 pm #98090
Latoya Stoudmire
ParticipantThere are several diverse types of encryptions used to protect our information yet, each type of encryption should be used for specific scenarios. Some of the most common types of encryptions are asymmetric encryption, symmetric encryption, Data encryption standard and advanced encryption standard. These encryptions alongside algorithm’s facilitate the protection of our data.
When trying to encrypt large bulks of data or protecting payment information in the form of credit cards, companies typically use symmetrical encryptions. symmetric encryption allows the system to move faster than asymmetric when trying to process information at higher speeds. This type of encryption also allows safety of the data using a one key encryption. Symmetric encryption requires the same key used to encrypt the message also be used to decrypt the message. The message is sent using permutations. Using the same key for encrypting and decrypting can cause potential security risk as explained in article from Key Factor “people (or technology) who want to correspond via symmetric encryption must share the key to do so, and if the channel used to share the key gets compromised, so does the entire system for sharing secure messages since anyone with the key can encrypt or decrypt those communications.” When to use symmetric encryption vs. asymmetric encryption (2023)
When security is a top priority and time constraints are not as huge of an issue asymmetric encryption is used. Asymmetric encryption provides more security than symmetric. With asymmetric encryption two distinct types of permutations are used whereas with symmetrical encryption only one type of permutation is used. Asymmetric encryption is used for things like digital signatures, block chains, and public key infrastructures.
An advanced encryption standard is a form of symmetric encryption, yet it uses highly sophisticated encryption unlike a basic symmetric encryption. Advanced encryption standards are used with sensitive government data.
-
-
AuthorPosts
- You must be logged in to reply to this topic.