***Please answer the following bulleted questions with at least 1 paragraph for each response.***
Ciphers and Encryption
· Examine the different types of applications of the stream cipher and the block cipher. Select the one (1) that you would prefer to use and describe it in a post. Justify your response. Use Internet references published within the past [1] year.
· Examine the major strengths and weaknesses and the various applications of Data Encryption Standard (DES). Recommend what you believe to be the best application for DES and describe it in a post. Provide a rationale for your response. Use Internet references published within the past [1] year.
AES and DES
· Use the Internet and to research (within the past [1] year) the manner in which organizations regularly use the Advanced Encryption Standard (AES). Once your research is completed, determine the most common types of organizations that use AES, examine the manner in which they use AES, and state them in a post. Imagine that you are in charge of an organization similar to the ones you discovered in your research. Determine whether or not you would use AES encryption for the same types of applications and comment on this in your post. Justify your response.
· Use the Internet and / or Strayer Library to research (within the past [1] year) the manner in which organizations regularly use the Triple Data Encryption Standard (DES), and then evaluate the effectiveness of Triple DES as an encryption model. Compare the major advantages and disadvantages of Triple DES to other versions of DES. Recommend two (2) types of organizations that are best suited for Triple DES. Provide a rationale for your response.
Numbers
· Examine the role that prime numbers play in cryptography. Conclude whether or not cryptology would be as effective without the use of prime numbers. Provide a rationale for your response. Use internet references published within the past [1] year.
· Examine the importance of random numbers in encryption. Give your opinion as to whether random numbers make encryption more or less secure. Provide a rationale for your response. Use internet references published within the past [1] year.
Bottom of Form