Data Encryption Standard (DES) and Issues of DES and its Replacement
Haitham Ismail
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke
Beschreibung
Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, , language: English, abstract: This report will select one of the obsolete cryptographic algorithms, analyse it, discuss one of its vulnerabilities, and suggest a modern algorithm to address this weakness. The business Management system (BMS) is a powerful management tool that helps an organisation’s management build, create, control, and monitor business activities. Currently, it evolved and has become the backbone of strategic planning and everyday business operations. BMS has the technical infrastructure, such as access control, to protect information from unauthorised access. Still, it can not be used alone to preserve the confidentiality and integrity of information handled against different challenges such as secure system development and maintenance, operation and physical security and compliance with regulations. Cryptography plays an essential role in protecting data’s confidentiality and integrity, which might be hosted within the companies’ premises or outsourced to a cloud service. Furthermore, cryptography protect information processed and transmitted within a communication medium. BMS incorporates many algorithms that serve this purpose; however, some of them are legacy or obsolete, such as RC2, RC4, DES, 3DES, MD2, MD4, MD5, SHA-1, and no longer recommended to be used because they are proved to be vulnerable.
Kundenbewertungen
DES, AES, Encryption, Cybersecurity