NT2580: Unit 7elect Appropriate Encryption Algorithms Instructions:

Match common encryption algorithms and methods with the scenarios representing real-world business
applications and requirements.
Common encryption algorithms and methods:
 Data Encryption Standard (DES)
 Rivest, Shamir, and Adleman (RSA) encryption algorithm
 Triple DES
 Diffie-Hellman key exchange
 International Data Encryption Algorithm (IDEA)
 El Gamal encryption algorithm
 Carlisle Adams and Stafford Taveres (CAST) algorithm
 Elliptic curve cryptography (ECC)
 Blowfish
 Secure Sockets Layer (SSL)
 Advanced Encryption Standard (AES)
 Digital signature
Scenarios:
1. Shovels and Shingles is a small construction company consisting of 12 computers that have
Internet access. The company’s biggest concern is that a wily competitor will send e-mail
messages pretending to be from Shovels and Shingles in order to get confidential information.
Select an encryption solution that best prevents a competitor from receiving confidential
information and justify the recommendation. RSA | Diffie-Hellman Key Exchange | SSL
2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All
employees communicate using smartphones. Top Ads’ primary concern is protecting the data on
the smartphones. Select an encryption solution that best protects the smartphones and justify the
recommendation. AES | Digital Signature
3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have
Internet access and 45,000 servers. All employees communicate using smartphones and e-mail.
Many employees work from home and travel extensively. NetSecIT would like to implement an
asymmetric general-purpose encryption technology that is very difficult to break and has a
compact design so that there is not a lot of overhead. Select an encryption solution that best
meets the company’s needs and justify the recommendation. SSL | AES | Digital Signature |
RSA | Diffie-Hellman Key Exchange