Encryption Algorithms
Instructions:
Match common encryption algorithms and methods with the scenarios representing real-world business
applications and requirements. Explain each choice in 1-2 sentences.
Common encryption algorithms and methods:
Data Encryption Standard (DES)
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Triple DES
Diffie-Hellman key exchange
International Data Encryption Algorithm (IDEA)
El Gamal encryption algorithm
Carlisle Adams and Stafford Taveres (CAST) algorithm
Elliptic curve cryptography (ECC)
Blowfish
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Digital signature
Scenarios:
Encryption Algorithm Scenario
ECC
Digital Signature
AES
Blowfish
1. Shovels and Shingles is a small construction
company consisting of 12 computers that have
Internet access. The company’s biggest concern is
that a wily competitor will send e-mail messages
pretending to be from Shovels and Shingles in order
to get confidential information. Select an encryption
solution that best prevents a competitor from
receiving confidential information and justify the
recommendation.
DES
SSL
Digital signature
2. Top Ads is a small advertising company consisting of
12 computers that have Internet access. All
employees communicate using smartphones. Top
Ads’ primary concern is protecting the data on the
smartphones. Select an encryption solution that best
protects the smartphones and justify the
recommendation.
ECC
BLOWFISH
3. NetSecIT is a multinational IT services company
consisting of 120,000 computers that have Internet
access and 45,000 servers. All employees
communicate using smartphones and e-mail. Many
employees work from home and travel extensively.
NetSecIT would like to implement an asymmetric
general-purpose encryption technology that is very
difficult to break and has a compact design so that
there is not a lot of overhead. Select an encryption
solution that best meets the company’s needs and
justify the recommendation.
AES
RSA
SSL
4. Backordered Parts is a defense contractor that
builds communications parts for the military. The
employees use mostly Web-based applications for
parts design and information sharing. Due to the
sensitive nature of the business, Backordered Parts
would like to implement a solution that secures all
browser connections to the Web servers. Select an
encryption solution that best meets the company’s
needs and justify the recommendation.
AES
Blowfish
5. Confidential Services Inc. is a military support
branch consisting of 14,000,000 computers with
Internet access and 250,000 servers. All employees
must have security clearances. They communicate
mainly through internally secured systems.
Confidential Services Inc. is concerned that sensitive
information may inadvertently be exposed and wants
to implement a symmetric file encryption algorithm
that is strong but fast. Select an encryption solution
that best meets the company’s needs and justify the
recommendation.