OCU ISCAP A Week 02 Lesson 07 Discussion

Viewing 1 reply thread
  • Author
    • #91482
      Manny Varela

      Choose 1 Symmetric Cipher and explain this to a person that is not knowledgeable of cybersecurity or technology.  Write this in complete sentences and in paragraphs in your own words.  If you use any terms, be sure to explain them in a non-technological way.

    • #91861
      Aaron Elliott

      When two people wish to send information to each other but want the information to be kept secret they would try to hide it from the wrong people, they would make the information secret through the use of cryptography. A way they make the information secret is by taking plain text of a specific size, which is specified by bits, which a bit is the smallest information stored on a computer, typically a one or zero integer, and transform it into a jumbled mess of text, this is called a block cipher. A popular method is called Blowfish which is also a block cipher, which has no effective way to crack the secret of the message yet. Blowfish can keep blocks up to 64 bits of information secret and does so by having multiple layers of protection called rounds. The key to unlock the information can vary from 32 bits up to 448 bits.

Viewing 1 reply thread
  • You must be logged in to reply to this topic.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!