Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: May 11th, 2022

Question 1: Cryptographic algorithms

Security Questions
Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words).
1. Cryptographicalgorithmsprovidetheunderlyingtoolstomostsecurity protocols used in today’s infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. These algorithms fall into two main categories: symmetric key and asymmetric key cryptography. In this essay, please discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used. Then discuss the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used.
2. Cryptography has been used in one form or another for over 4000 years and attacks on cryptography have been occurring since its inception. The type of people attempting to break the code could be malicious in their intent or could just be trying to identify weaknesses in the security so that improvements can be made. In your essay response, define cryptanalysis and describe some of the common cryptanalytic techniques used in attacks.
3. Many people overlook the importance of physical security when addressing security concerns of the organization. Complex cryptography methods, stringent access control lists, and vigilant intrusion detection/prevention software will be rendered useless if an attacker gains physical access to your data center. Site and facility security planning is equally important to the technical controls that you implement when minimizing the access a criminal will have to your assets. In your essay response, define CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response.

Security Questions
Question 1: Cryptographic algorithms
Strengths and weaknesses of symmetric key cryptography
Symmetric key cryptography is a cryptographic algorithm method that uses the same key to encrypt and decrypt. The strengths of symmetric key cryptography include being incredibly secure due to the ability to apply a secure algorithm based on designated Advanced Encryption Standards. The extremity in terms of security of the symmetric key cryptography is provided by a 256-bit key length, which makes it impossible for even the fastest computer in the world to break the key. The strength of symmetric key cryptography is that it is relatively fast and provides an easy decrypting process and encrypting (Lander, 2020). The weaknesses of symmetric key cryptography include difficulties in sharing the key, and it can results in more damage if one side in two-way encrypted communication is damaged. Symmetric key cryptography can be used in embedded technology such as One Time Pad.
Strengths and weaknesses of asymmetric key cryptography
The asymmetric key cryptography is applied in conducting communication over insecure channels, to create a cryptographically secure channel. The strength of asymmetric includes high scalability since it does not require exchanging keys, which eliminates the key distribution problem and therefore making it more secured (Miller, 2016). The disadvantage of the asymmetric key cryptography is that it is very slow in generating fresh, strong keys and very slow in the encrypting process.

Question 2: Cryptography
Cryptanalysis entails the process of studying cryptographic systems to identify weaknesses or information leaks. The study involves a mathematical analysis of codes, ciphers, and related algorithms in the cryptography to create and improve the encryption codes, algorithms, or ciphers. Several cryptanalysis techniques used in attacks exist, with the common including ciphertext-only attack, whereby the attacker uses frequency analysis to attack the encrypted message that is only known since the attacker knows nothing about the plaintext data. Another common attack technique is a known-plaintext attack, whereby the attacker has access to some or all of the ciphertext and plaintext. The attacker uses the known plaintext and the matching ciphertext to discover the key used in encrypting and decrypting the message (Rouse, 2020). Another common cryptanalytic technique used in attacks is the chosen-plaintext attack. The attacker attempts to gain access to the target encryption device and runs different pieces of plaintext through the device to encrypt it. The last common cryptanalytic technic used by attackers is man-in-the-middle attacks. The attack occurs by the attacker position himself in the communication channel, gaining the ability to intercept the key exchange between two communicating parties on a secured line. The attacker obtains the key when it is communicated between parties to encrypt or decrypt messages or communication.
Question 3: Crime Prevention Through Environmental Design (CPTED)
Crime Prevention Through Environmental Design (CPTED) is defined as a multidisciplinary approach that aims at deterring criminal behavior by focusing on changing how places within the target environment are laid out, how they look, and how they feel. CPTED consists of three strategies: natural access control, territorial reinforcement, and natural surveillance (Deutsch, 2019). Natural access control involves decreasing the opportunity for a crime by denying access to crime targets and creating risk perspective to offenders. Natural surveillance involves the increase of awareness by residents or visibility increase of the building for users who us or enter the property, minimizing the ability of a person to commit the crime without being seen. Lastly, territorial reinforcement strategy design features that indicate proprietorship to perceive a territorial influence on offenders.
Target hardening is the application of mechanical devices that make an area hard to access, such as locks, alarms, monitoring systems, and security systems. Despite target hardening making an area harder to access, the approach tends to make the inhabitants feel unsafe. Therefore, the use of CPTED strategies is considered effective and less threatening.
References
Deutsch, W. (2019). Crime Prevention Through Environmental Design. The Balance. Retrieved from https://www.thebalancesmb.com/crime-prevention-through-environmental-design-394571
Lander, S. (2020). Advantages & Disadvantages of Symmetric Key Encryption. Leaf Group. Retrieved from https://itstillworks.com/create-pgp-key-5815935.html
Miller, B. (2016). Pros and Cons of Asymmetric Encryption. Green Garage. Retrieved from https://greengarageblog.org/8-pros-and-cons-of-asymmetric-encryption
Rouse, M. (2020). Cryptanalysis. TechTarget. Retrieved from https://searchsecurity.techtarget.com/definition/cryptanalysis#:~:text=Other%20types%20of%20cryptanalytic%20attacks,into%20using%20a%20weakened%20cryptosystem.

Order | Check Discount

Tags: Question 1: Cryptographic algorithms

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.