164k views
4 votes
Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. You may use the course textbook and the Internet to research encryption algorithms and methods.

Common encryption algorithms and methods:

Data Encryption Standard (DES)

Rivest, Shamir, and Adleman (RSA) encryption algorithm

Triple DES

Diffie-Hellman key exchange

Elliptic curve cryptography (ECC)

Blowfish

Secure Sockets Layer (SSL)

Transport Layer Security (TLS)

Advanced Encryption Standard (AES)

Digital signature

User Vermin
by
5.3k points

1 Answer

1 vote

The question is incomplete as the scenarios are not given that were to be matched by the given encryption algorithms.

By finding the question from internet i have attached the image of the scenarios in the form of table and answered below accordingly

Answer:

Scenario A:

Advanced Encryption Standard (AES) is a technique that uses 256-bit cipher texts for encryption process. The data encrypted by AES cannot be attacked and even it cannot be decrypted unless a brute-force search is used through all of possible 256-bit keys.For mobile security it is known as one of the best algorithms.

Scenario B:

Following are the techniques of encryption used for given scenario:

  • ECC
  • Digital Signature
  • AES
  • Blowfish

Scenario C:

Following are the techniques of encryption used for given scenario:

  • ECC
  • Blowfish

Scenario D:

Secure Sockets Layer (SSL) - SSL is a protocol that is commonly-used for managment of the message transmission security over the Internet)

Scenario E:

Advanced Encryption Standard (AES) - AES is an encryption algorithm used by U.S. Government agencies for securing sensitive but unclassified material .

i hope it will help you!

Match common encryption algorithms and methods with the scenarios representing real-example-1
Match common encryption algorithms and methods with the scenarios representing real-example-2
User KevBry
by
5.5k points