Question: REPLY TO THIS DISCUSSION Hello Everyone, For this week's discussion post, we are tasked with explaining two different types of cryptographic techniques. Firstly, we must
REPLY TO THIS DISCUSSION Hello Everyone, For this week's discussion post, we are tasked with explaining two different types of cryptographic techniques. Firstly, we must understand what cryptography is? IBM (2024) suggests that cryptography is a method used to encrypt information so that it cannot be obtained or interpreted by third party users. IBM (2024) discusses that there are three main cryptographic categories, including: symmetric key cryptography, asymmetric key cryptography, and one-way hash algorithms. Each of these categories of cryptography provide the user with security in different ways with various techniques associated with each category. One technique from the symmetric key cryptography section is blowfish. Symmetric key cryptography protects information by requiring a private key to access the information. This technique is block cipher which is free and accessible to the public (IBM, 2024). Asymmetric key cryptography functions in two ways: RSA and ECC (IBM, 2024). These methods utilize public key and private key encryption as this method can be more secure. RSA is the oldest method of asymmetric key cryptography utilizing public key encryption (IBM, 2024). The last category is one-way hash algorithms. This method produces a "fixed-length output string from a variable-length input sting" (IBM, 2024). In this method, the input produces normal communication while the output hash is a cipher. IBM (2024) suggests that this method functions in the followi
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
