Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

---> The purpose of the research paper is to give a thorough survey of Symmetric

ID: 3726902 • Letter: #

Question

---> The purpose of the research paper is to give a thorough survey of Symmetric Cryptography.

Whole topic must be in 1500 words.

----> Items that should be addressed include, but are not limited to:

1) Strengths of using this form of cryptography

2) Weaknesses of using this form of cryptography

3)Description of algorithms that implement symmetric cryptography and strengths / weaknesses of each algorithm

4)Relevant examples of modern applications / industry that utilize Symmetric cryptography

5)Why does Symmetric cryptography work best for these applications?

Explanation / Answer

If the key for encryption and decryption is the same shared secret,then the cryptographic algorithm is termed as symmetric algorithm.The key must be shared for both sender and receiver.the sender applies the encryption function using the key to clear text to produce cipher text.The cipher text is sent to receiver,who then applies the decryption function using the same shared key.

1.Strenghts of Cryptographic:Cryptography is an essential information security tool.It is having following strenghts.

1.Confidentislity:Encryption technique can guard the information and communication from unauthorized revelation and access of information.

2.Authentication:The cryptographic techniques such as a MAC and digital signatures can protect information against spoofing and forgeries.

3.Data Integrity:The cryptographic hash functions are playing vital role in assuring the users about the data integrity.

Non-repudiation:The digita; signature provides the non repudiation service to guard against the dispute that may arise due to denial of passing message by the sender.

Weakness of cryptographic:

1.High availability:

cannot be ensured through the use of cryptography.Other methods are needen to guard against the threats such as denial of service or complete breakdown of information system.

2.Cryptography comes cost.Addition of cryptographic techniques in the information proceesing leads to delay.

3.The use of public key cryptographic requires setting up and maintenanace of public key infrastructure requiring the handsome financial budget.

The best examples for cryptography are:Authentication or digital signatures,Time stamping,Electronic money,Secure network communications,Anonymous remailers,disk encryptioneetc..

In the event access control and successfully bypassed,the use of encryption on data stored and communicated in a systemprovides an extra layer of protection.Specially if an intruder is denied easy of access to stored file and communications.