Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 2 Brandon, Afifi, Syed, Haziq - Coggle Diagram
Group 2 Brandon, Afifi, Syed, Haziq
Question 3
Determine how encryption can protect data from being altered?
1) Scrambles it into an unreadable format (cipher text). Can read by the person who has the secret code, or decryption key.
3) Protection to the confidentiality of the digital data which is in the computer or transferred through Internet or any computer network. The role of algorithms used in encryption to protect the data.
2) Encryption is the best way to protect user file transfer or data from hacker. So, their files will be saved.
(Question 2) Define the following cryptographic terminologies
C. Decryption
Method of obtaining the encrypted message back to its original form
Opposite of encryption. It is turning ciphertext back to plaintext. Also, requires the correct password and the corresponding decryption algorithm.
D. Cryptanalysis
Art of finding some weakness and insecurity in a cryptographic scheme
B. Cipher Text
Ciphertext is plaintext that has been encrypted using an encryption algorithm. Ciphertext cannot be read until it has been decrypted (converted to plaintext).
Type of Cipher Text
1)Substitution ciphers
2)Transposition ciphers
3)Polygraphic ciphers
4)Permutation ciphers
5)Private-key cryptography
6)Public-key cryptography
A. Encryption
Data encryption is a common and effective security method a sound choice for protecting an organization’s information.
Explain Encryption Technology
What Is Encryption?
Encryption is a means of securing digital data using one or more
mathematical techniques
, along with a password or "key" used to decrypt the information.
The encryption process translates information using an algorithm that makes the original information
unreadable
.
The process, for instance, can convert an original text, known as
plaintext
, into an alternative form known as
ciphertext.
How Encryption Works?
Encryption strength depends on the
length of the encryption
security key.
The Advanced Encryption Standard (AES) is a protocol for data encryption created in 2001 by the U.S. National Institute of Standards and Technology.
AES uses a 128-bit block size, and key lengths of 128, 192, and 256 bits
General Methods of Encryption
The first is known as
Symmetric Encryption
Cryptography. It uses the same secret key to encrypt the raw message at source, transmit the encrypted message to the recipient, and then decrypt the message at the destination.
The second method is called
Asymmetric Encryption
Cryptography, which uses two different keys – one public and one private – to encrypt and decrypt data.
A third cryptography method is
Hashing
, which is used to efficiently verify the integrity of data of transactions on a network or to verify the fidelity of data that has been copied or downloaded against the original.