D6 52

Posted: August 26th, 2021

D6 52

Author

Institutional Affiliation

Course

Instructor

Date

                                                                         D6 52

Choice of Algorithm

            According to the organization setting, the following are the most appropriate recommendations that the company can use:

  • Diffie-Hellman key exchange
  • Secure Sockets Layer (SSL)
  • Rivest, Shamir and Adleman (RSA) encryption algorithm

The RSA algorithm is among the most preferred encryption method for pubic key encryption. It is useful for either encryption or digital signatures. The Diffie-Hellman key exchange is not executed on hardware structures. However, it is suitable for email encryptions. Lastly, Secure Sockets Layer (SSL) provides secure communication between the server and the client.

Choice of Encryption

            The following encryptions would be suitable for the organization

  • Advanced Encryption Standard (AES)
  • Digital Signature
  • Elliptic curve cryptography (ECC)

The Digital Signature is an efficient algorithm for the SHA-1 hash function for computing message digest. Equally, the AES is highly secure and will be appropriate when employees create passwords for use on their smartphones. On the other hand, the ECC algorithm provides a small key size that reduces transmission and storage needs. Hence, it can factor two or more large prime factors. Such capability makes the algorithm difficult for cracking.

Summary

            The reason for choosing these encryption algorithmsis that they allow a combination of Asymmetric and Symmetric Key algorithms to enhance the whole encryption system. For instance, whenever SSL is applied, the Web-based applications are adequately secured when accessing the internet. Subsequently, since the company is seeking for a fast and robust system, AES is suitable to enhance the security of Confidential Services. Similarly, the RSA acts as a supportive algorithm for AES while SSL increased internet access security. Further, ECC encryption is a proven system that has been used by the U.S National Intelligence Security Agency to protect both confidential and top secret information using 384-bit keys. Thus, these systems will assure the company of reliable and efficient security implementation.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00