ipl-logo

Nt1330 Unit 3 Assignment Of Encryption Algorithm

865 Words4 Pages

A. Encryption Concept

Encryption is the process of using a formula called the cryptographic algorithm to translate plain text into an incomprehensible code and later convert it back to plain text [3]. The text relies mainly on the use of a numeric value, called the key, which is part of the encryption algorithm.
B. Cloud Computing Concept Cloud computing has become part of users' lifestyles because sources such as data storage, and computer systems are accessible as needed through networks that offer various computing services that do not require resources located on customers' personal computers, such as space resources for data storage[4] .

Cloud-computing architecture using four cloud-deployment models: private clouds, public clouds, hybrid …show more content…

3DES takes more time to implement compared to DES.

• Blowfish algorithm:

It is a symmetric cryptographic algorithm established by Bruce Schneier in 1993 [10]. As the source [10] states, Blowfish is faster than the DES algorithm. Blowfish receives 64-bit as an input block to enter the encryption process. Also, the algorithm takes a key of different lengths, from 32 bits to 448 bits, where the key length ranges between these two numbers [10]. This makes it ideal and is faster compared to the DES algorithm. In addition, it has 16 to 17 rounds during text encryption.
• Message-Digest (MD5) algorithm [11]:

The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit hash value, typically expressed in text format as a 32-digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications to verify data integrity. The MD5 function was designed by Ron Rivest in 1991 to replace an earlier hash function called MD4 [11]. The MD5 hash uses a one-way algorithm, so it cannot decrypt after the encryption process. The only way to decode the MD5 hash is to convert a string to the MD5 hash and compare the resulted hash to the string that has already been

More about Nt1330 Unit 3 Assignment Of Encryption Algorithm

Open Document