Study Ton

Education and Writing Tips - Personal Blog

Encryption Tools and Hackers

Assignment 1: Cyber Encryption Tools, which one is your favorite?

In selecting the best encryption software to use at this digital age, it is important to pay attention to the features that they offer. In addition to this, one should settle for an encryption software that is user-friendly and one that offers sufficient security for your computer information.

My favorite cyber encryption tool for the year 2017 is AxCrypt Premium. The main reason why I chose this software as my favorite is because it is easy to use and it is one of the few software that offers public key cryptography. This is an encryption system that uses two keys in file transfer, one that is a public key and the other which is a private key and is only known by the one who receives the message. This feature is new in the cyber world in comparison to traditional symmetrical algorithms that focus on the importance of storing and remembering one’s passwords (Hunter et al., 2017).

This tool is also offered by very few competitors and it is a crucial element in protecting one’s information. This reason coupled with the ease of use offered from the interface makes it my favorite cyber encryption tool. The public key cryptography works in such a manner that when a sender wants to share documents, he or she encrypts the same using your public key and when you receive the same documents, your private key goes ahead and decrypts such information. This system is also known as asymmetric cryptography since the public key is the only one that can be used to encrypt information and the private key used to decrypt it. It is impossible to know the private key from the public key that is shared since the private key creates digital signatures different from ones created by the public key (Salomaa, 2013).

 

This provides a sense of authentication as information is directly attributed or identified with the person who applied the digital signature (GlobalSign, 2017). I also settled for this tool as it offers rating on password strength and facilitates the creation of memorable passwords which are also stored online. The software also offers Password Management from its website that not only saves passwords online, but also generates suggestions to users. A user types a description of the password they want and the password generator comes up with seventeen characters that are easy to memorize (Sindhu & Meshram, 2012).

Assignment 2: Article Review

Federal Information Processing Standards (FIPS) are public standards developed by the United States government for use by non-military organizations and government contractors for computer systems. These standards mainly focus on coding and the encryption of data and are developed mainly by the National Institute of Science and Technology (NIST) for approval by the Secretary of Commerce (NIST, 2017).

An example of the FIPS is the FIPS 202 SHA-3 Standard which is defined as the Permutation Based Hash and Extendable-Output Functions. This standard was effective on the 5th of August 2015. Hash functions are crucial for information security in the form that they are used in the generation plus verification process of digital signatures, in the derivation of keys and in the pseudorandom generation of bits (Papachristodoulou et al., 2017).

Leave comment

Your email address will not be published. Required fields are marked with *.