How to Choose an Encryption Algorithm Cipher Coursework

Exclusively available on IvyPanda Available only on IvyPanda

Background on Encryption Algorithms

Encrypting information to ensure it can only be read by authorized parties is a concept that has been applied throughout history and has become a crucial part of today’s information technology and security. Most algorithms take an arbitrary string of characters, called a key, and use it, along with another algorithm, called a hash function, to transform a message into a seemingly random string. Larger key sizes correspond to more secure encryption, with sizes between 128 and 256 bits generally being used in modern applications.

We will write a custom essay on your topic a custom Coursework on How to Choose an Encryption Algorithm Cipher
808 writers online

Cryptographic keys are generally created through a secure random number generation algorithm, which receives its primary data from some non-deterministic source to output numerical data. This approach ensures that the output is as close to true randomness as possible, while regular computer random number generation algorithms use more predictable sources, such as the system clock, as input. Finally, symmetric encryption algorithms use a single key for both encryption and decryption (Manico & Detlefsen, 2014). Asymmetric algorithms use different keys for encryption (public key) and decryption (private key), thus allowing users to receive encrypted messages without exposing a means of decrypting them (Manico & Detlefsen, 2014). Modern encryption algorithms are sufficiently secure to be infeasible to defeat without access to the key; while theoretically possible, it would require more than a human’s lifetime to do with the most advanced hardware. Vulnerabilities can allow unauthorized decryption in a sufficiently short time to be feasible. The algorithms currently in use as standard have no known vulnerabilities.

Encryption Algorithm Recommendation

The choice of an encryption algorithm for long-term file storage involves certain security considerations. Archival does not imply transferal or modification of files; encryption will be applied to files to prevent unauthorized parties from accessing their contents. This data may have to be read at an unknown future date, meaning that the encryption should be fully reversible. Besides unauthorized access, this reversibility presents another potential risk: unauthorized alterations to the archived files. To mitigate this threat, encrypted files should be signed, making it obvious if they were changed between their initial encryption and later access (Manico & Detlefsen, 2014). Since the enciphered data does not need to be transferred or used by an entity other than Artemis Financial, there is no need to use an asymmetric algorithm.

Current government regulations primarily require that confidential information is secure without mandating the use of specific measures. Encryption, if not explicitly required by regulation, is often listed as a suggested solution to data security. Examples of such legislation are the Federal Trade Commission’s Standards for Safeguarding Customer Information and the European Union’s General Data Protection Regulation (European Union Agency for Fundamental Rights and Council of Europe, 2018) Federal Trade Commission, 2019). By encrypting its archives, Artemis Financial complies with such regulations.

Based on these considerations, the advanced encryption standard (AES) is the best option. It is the generally accepted standard, meaning that if a vulnerability is discovered, it will be publicized quickly. AES is a symmetric algorithm, meaning that the same cryptographic key is used for enciphering and deciphering data. Although symmetric algorithms can be viewed as less secure than asymmetric ones, it is not a critical difference when the encrypted data is not intended for transfer. Symmetric algorithms are faster than asymmetric ones, but this difference is not relevant for archival. Similarly, while a key size of 128 bits makes the time required to crack AES infeasible, larger keys can be used as a form of future-proofing at the expense of longer encryption and decryption times.

References

European Union Agency for Fundamental Rights and Council of Europe (2018). Handbook on European data protection law.

Federal Trade Commission (2019). Standards for safeguarding customer information. Federal Register, 84(65).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Manico, J., & Detlefsen, A. (2014). Iron-Clad Java. Oracle Press.

Print
Need an custom research paper on How to Choose an Encryption Algorithm Cipher written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, September 29). How to Choose an Encryption Algorithm Cipher. https://ivypanda.com/essays/how-to-choose-an-encryption-algorithm-cipher/

Work Cited

"How to Choose an Encryption Algorithm Cipher." IvyPanda, 29 Sept. 2023, ivypanda.com/essays/how-to-choose-an-encryption-algorithm-cipher/.

References

IvyPanda. (2023) 'How to Choose an Encryption Algorithm Cipher'. 29 September.

References

IvyPanda. 2023. "How to Choose an Encryption Algorithm Cipher." September 29, 2023. https://ivypanda.com/essays/how-to-choose-an-encryption-algorithm-cipher/.

1. IvyPanda. "How to Choose an Encryption Algorithm Cipher." September 29, 2023. https://ivypanda.com/essays/how-to-choose-an-encryption-algorithm-cipher/.


Bibliography


IvyPanda. "How to Choose an Encryption Algorithm Cipher." September 29, 2023. https://ivypanda.com/essays/how-to-choose-an-encryption-algorithm-cipher/.

Powered by CiteTotal, citation machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1