Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)OST C Discussion Lesson 05

Tagged: 

Viewing 5 reply threads
  • Author
    Posts
    • #66441
      Jessica Jagerson
      Keymaster

      Explain at least three different encryptions and when it would be appropriate to use them.

    • #104695
      Carlos Martes
      Participant

      So there are several types of encryption used to protect data, each suited to different scenarios. One is Advanced Encryption Standard (AES) which is a symmetric encryption method meaning the same key is used to both encrypt and decrypt data. It’s ideal for securing data to rest, such as files stored on a hard drive or customer information in a database. Next is Rivest Shamir-Adleman (RSA) which is a asymmetric encryption method that uses a public key for encryption and a private key for decryption. This makes it well suited to securely transmitting data over the internet, like encrypting emails or setting up secure website connections through HTTPS. Last is Elliptic Curve Cryptography. It is another asymmetric encryption technique that provides strong security with smaller key sizes, making it highly efficient. ECC is especially appropriate for use in mobile devices, IoT systems, and cryptocurrency applications where computing power and battery life are limited. Each encryption method has it’s strength and is chosen based on specific needs of the situation.

      • #104712
        Isabelle Tubbs
        Participant

        Hello, Carlos! Nice work on your explanation of AES, RSA, and ECC. Elliptic Curve Cryptography was a type of encryption I did not encounter before this discussion, so it was interesting to learn about it from your post. It makes sense for smaller devices to have a specific type of encryption for data, especially with the widespread use of mobile devices today.

    • #104707
      Cameron Tackett
      Participant

      Encryptions were really interesting to me. I did not realize there were so many different “styles” if you will. RSA or Rivest Shamir Adleman could be used to submit data over the internet. It lets the input of data be “password free”. However, the end user or receiving side need a “pass word” to be able to get the data. This way you have control over who is able to open/view the data you are sending out. Websites is a great place for this to be used, or emails. ECC has a smaller size, meaning it is great for less powerful machines like cell phones or tablets. The next one that peaked my interest was AES I could see this being used in a business setting where data is being exchanged with servers/or storage systems. That way it takes special access to input and export. I could also see this being used as a way for a potential contractor to make sure that a customers data is secure between both contractor and supplier.

      • #105498
        Carlos Martes
        Participant

        Hello Cameron! AES is also an encryption in which i find quite interesting because it is indeed one of the most widely used encryption algorithms today. Another fun fact i learned about AES is that there are no known practical vulnerabilities that allow attackers to decrypt AES without the key. i can see how there could be some theoretical side channel attacks that can happen, but those initially require physical access to the device and very specific conditions. Good input altogether!

      • #105530
        Misty Stewart
        Participant

        Hi Cameron, Thank you for your post. Indeed, there are various encryption methods, each with its unique advantages and applications. RSA is widely used for secure data transmission over the internet, allowing for password-free input while ensuring that only authorized recipients can access the data with a password. This makes it ideal for websites and emails. Encryption plays a crucial role in maintaining data security and privacy. Thank you for the information!

    • #104710
      Misty Stewart
      Participant

      Symmetric encryption uses the same key for both encryption and decryption. This method is fast and efficient, making it suitable for encrypting large amounts of data. AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm. Symmetric encryption is appropriate for scenarios where the key can be securely shared between parties, such as encrypting data at rest on a hard drive or securing communication within a closed network. Asymmetric encryption, also known as public-key encryption, uses a pair of keys: a public key for encryption and a private key for decryption. This method is more secure for transmitting data over insecure channels, as the public key can be shared openly while the private key remains confidential. RSA (Rivest-Shamir-Adleman) is a popular asymmetric encryption algorithm. Asymmetric encryption is appropriate for scenarios such as securing email communication, digital signatures, and establishing secure connections over the internet. Hashing is a one-way encryption method that converts data into a fixed-length hash value. Hashing is not reversible, meaning the original data cannot be retrieved from the hash value. SHA (Secure Hash Algorithm) is a common hashing algorithm. Hashing is appropriate for scenarios where data integrity needs to be verified, such as storing passwords securely, ensuring data integrity in file transfers, and creating digital fingerprints for documents. These encryption methods play a crucial role in protecting sensitive information and ensuring secure communication in various contexts.

      • #105505
        Teisha Nolen
        Participant

        Hi Misty!

        This is a great summary of a few different encryption methods. I loved how you explained several different types of encryptions, as well as giving some applications for both Symmetric and Asymmetric encryption. Asymmetric encryption would seem to be the best choice from a security standpoint, but because of the resources needed, sending large sets of data by this method isn’t usually feasible. I was struggling to understand the application of Asymmetric Encryption, so I love how you have provided real-world examples of when that method would apply.

    • #104711
      Isabelle Tubbs
      Participant

      Encryptions are vital for securing data because they scramble that data using an encryption algorithm, which often involves the use of a pre-shared key (PSK) to secure, unlock, and unscramble the information. Three types of encryptions include RSA, 3DES, and AES. RSA (Rivest-Shamir-Adleman) encryption uses cryptography algorithms with two keys and are great to use with VPNs and services with email and communication (Human, 2023). Its purpose is based more on the type of information that needs to be secured rather than the type of organization. 3DES (Triple Data Encryption Standard) encryption, which can use two keys or three keys, uses a process of encrypting, decrypting, and encrypting again; it is often used for financial companies (Human, 2023). Finally, AES (Advanced Encryption Standard) encryption uses a block cipher that is symmetric and should mainly be used for classified data, like data from large organizations or the government (Human, 2023).

      References
      Human, H. (2023, February 2). Types of Encryption [Explanations, Examples, Significance] https://review42.com/resources/types-of-encryption/

    • #105504
      Teisha Nolen
      Participant

      Encryption is a code of sorts that is put in place as an attempt to keep private the data that we are sending over the internet. I say “as an attempt” because just like any other code, encryption code can be cracked by those who know what to look for. Encryption falls into one of 2 main categories: Symmetric Encryption, meaning the same key can be used for both encryption and decryption, and Asymmetric Encryption, meaning an encrypted message cannot be decrypted using the same key. At first glance, one would think that Asymmetric Encryption would be the better type to use, however, this type of encryption uses a lot of resources, and therefore can be impractical for large amounts of data.

      Some of the more common types of encryptions are AES (Advanced Encryption Standard), IPsec (Internet Protocol Security), and RSA (named after its inventors, Rivest, Shamir, and Adleman). AES is a symmetric encryption that encrypts data in 128-bit blocks and then arranges them in a grid to further complicate decryption. This type of encryption is used for most end-to-end encryption applications.

      IPsec is an encryption method commonly used for VPNs, such as the one that I use to work remotely in my current role. The purpose of IPsec is to provide privacy and data integrity using a process called “hashing algorithms.”

      RAS is a secure method of encryption that multiplies large prime numbers to create an encryption key.

      As you can see, there are many different encryption methods, keeping the data we send safe. As technology (as well as hackers) continues to evolve, I imagine we will continue to see encryption methods evolve as well.

      Hauk, C. (2021, May 31). Common encryption types explained. Pixel Privacy. https://pixelprivacy.com/information-security/common-encryption-types-explained/

      • #105512
        Cameron Tackett
        Participant

        Teisha,

        Firstly, I enjoyed reading your post. I did not know the IPsec information, and that it went so commonly with VPN’s. After reading your input on it. It made perfect sense. I think it is funny how just a little bit more input on something can really make things “pop” inside your brain. Something I believe it will be very interesting to see what kind of encryption follows VPN’s and what kind of hardware will be developed to help either the ease of use. For not Tech savvy people. Or to help with the administration duties as well.

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.