Critical Thinking Assignment 4-2 PDF

Title Critical Thinking Assignment 4-2
Author Dallas Rosenthal
Course Applications in Information Security
Institution State College of Florida, Manatee-Sarasota
Pages 2
File Size 66.9 KB
File Type PDF
Total Downloads 63
Total Views 140

Summary

Critical Thinking Assignment...


Description

Cr i t i c alThi nki ng42:Re c omme nde dCr ypt ope r i ods Ho wl ongs houl dake ybeus e dbe f or ei ti sr e pl ac e d?Se ar c ht heI nt e r ne t f ori nf or mat i onr e g ar di ngc r ypt ope r i odsf orhas h, s y mme t r i c ,andas ymme t r i cal gor i t hms .Fi nda tl e as tt hr e es our c e sf o re ac hoft heal g or i t hms .Dr a wa t abl et hatl i s t st heal gor i t hmsandt her e c omme nde dt i me ,andt he nc al c ul a t e t hea v e r ag ef ore ac h. Doy ouagr e eo rdi s agr e e ?Whatwoul dbey ourr e c omme nda t i ononc r ypt ope r i odsf ore a c h?Why ?

Algorithm

Max Time

Average

Sources

Hash

2yrs

1.8yrs

https://web.archive.org/web/20110 617055733/http://ww w.cse-cst.gc.ca/itssti/services/cryptoservices-crypto/caac-eng.html https://infoscience.epfl.ch/record/ 164539/files/NPDF32.pdf https://info.townsendsecurity.com/definitive-guideto-encryption-keymanagement-fundamentals

2yrs

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST. SP.800-57pt1r4.pdf

1.5yrs 2yrs

Symmetric

2yrs 2yrs 2yrs

https://www.keylengt h.com/en/4/ https://csrc.nist.gov/P rojects/Key-Management

Algorithm

Max Time

Average

Sources

Asymetric

3yrs

2.7yrs

https://securityncompliance.wordpress.com/2014/04/19/cryp tographic-keys-andtheir-cryptoperiodnist-recommendations-2012/ https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST. SP.800-57pt1r4.pdf https://www.gronauit-cloud-computing.de/en/cryptographic-key-lengthrecommendationfrom-organizations/

3yrs 2yrs

Thec r ypt ope r i odss u gg e s t e da r eonl yr oughgui de l i ne s ;l on g e rors hor t e rc r ypt ope r i odsma ybewa r r a nt e d, de pe n di n gont h ea ppl i c a t i ona nde n vi r onme nti nwhi c h t hek e y swi l lbeus e d .Ho we v e r ,whe na s s i gni n gal on g e rc r ypt ope r i odt ha nt ha ts ugg e s t e dbe l o w,s e r i ousc ons i de r a t i ons houl dbegi v e nt ot her i s ksa s s oc i a t e dwi t hdoi n gs o.Shor t e ri sa l wa y sbe t t e re v e nt hou ghi tmi ghtnotbee a s i e rt oa p pl y .Iwoul d r e c omme ndt hes hor t e s tt i mef ore a c hc r ypt ope r i odbe c a us eoft her i s ksa s s oc i a t e d wi t hl on g e rpe r i ods ....


Similar Free PDFs