Posted: August 26th, 2021
D6 52
Author
Institutional Affiliation
Course
Instructor
Date
D6 52
Choice of Algorithm
According to the organization setting, the following are the most appropriate recommendations that the company can use:
The RSA algorithm is among the most preferred encryption method for pubic key encryption. It is useful for either encryption or digital signatures. The Diffie-Hellman key exchange is not executed on hardware structures. However, it is suitable for email encryptions. Lastly, Secure Sockets Layer (SSL) provides secure communication between the server and the client.
Choice of Encryption
The following encryptions would be suitable for the organization
The Digital Signature is an efficient algorithm for the SHA-1 hash function for computing message digest. Equally, the AES is highly secure and will be appropriate when employees create passwords for use on their smartphones. On the other hand, the ECC algorithm provides a small key size that reduces transmission and storage needs. Hence, it can factor two or more large prime factors. Such capability makes the algorithm difficult for cracking.
Summary
The reason for choosing these encryption algorithmsis that they allow a combination of Asymmetric and Symmetric Key algorithms to enhance the whole encryption system. For instance, whenever SSL is applied, the Web-based applications are adequately secured when accessing the internet. Subsequently, since the company is seeking for a fast and robust system, AES is suitable to enhance the security of Confidential Services. Similarly, the RSA acts as a supportive algorithm for AES while SSL increased internet access security. Further, ECC encryption is a proven system that has been used by the U.S National Intelligence Security Agency to protect both confidential and top secret information using 384-bit keys. Thus, these systems will assure the company of reliable and efficient security implementation.
Place an order in 3 easy steps. Takes less than 5 mins.