Encryption Standard and Real Life Examples

Words
529 (1 page)
Downloads
43
Download for Free
Important: This sample is for inspiration and reference only

Table of contents

Encryption Standard

The NIST is an association gone to help US monetary and open welfare issues by giving authority to the country's estimation and norms framework. That is actually an extravagant method for saying they set the principles for things like encryption in accordance with non-ordered government data both in travel and in rest. Truly, there are a great deal of standards, or FIPS, we're actually just worried about the ones that relate to scrambled information in movement, or all the more explicitly, as they identify with SSL. Remember, these gauges aren't authoritative. In any case, they are proposed by the US Government for any non-ordered information (Nohe, 2017).

No time to compare samples?
Hire a Writer

✓Full confidentiality ✓No hidden charges ✓No plagiarism

NIST has broken it encryption measures in few classifications and they are Hash Functions, Symmetric and Asymmetric Algorithms. A few classes are endorsed to be used in NIST, in light of either in block cipher or in hash functions. Block Cipher Algorithms are of three types. DES, Triple DES and AES. NIST prescribes AES as the present encryption measures. In FIPS 197 the AES is determined. AES, which was endorsed in the end of 2001. AES must be utilized with the methods of activity planned explicitly for use with block cipher algorithms. In 2001, NIST declared the endorsement of FIPS 197, AES. This standard determines the Rijndael algorithm as a FIPS-affirmed symmetric-key calculation that might be utilized by U.S. Government associations (and others) to ensure delicate data (Block Cipher Techniques, n.d.).

Real Life Examples

Archive and Compression Tools

If we just downloaded an Internet record, at that point opened it to see that the document was compacted (which implies that the first record measure has been diminished to limit the impacts on your plate hard), almost certainly, the introduced programming depends on AES encryption. Regular pressure devices, for example, WinZip, 7 Zip and RAR enable you to pack and unfasten documents to advance extra room. What's more, practically all utilization AES to guarantee document security (Mason, 2017).

Disk/Partition Encryption

On the off chance that we definitely know the idea of cryptography and have found a way to guarantee the safety of your own data, almost certainly, the disk or partition encryption programming you are utilizing utilizes an AES. BitLocker, FileVault, and CipherShed are all encryption programming that keeps running on AES to ensure the classification of your data (Mason, 2017).

VPNs

The AES algorithm is additionally usually connected to VPNs. A VPN is an instrument that enables you to utilize an open Internet association with interface with a progressively secure the system. The VPNs work by making a 'burrow' between an open system and an encoded system on a server that is running a VPN supplier (Mason, 2017). For instance, in the event that you normally do work from your neighborhood coffeehouse, you are most likely mindful that the open association is inconceivably uncertain and abandons you helpless against a wide range of hacking. With a VPN, you can without much of a stretch take care of this issue by associating with a private system that will cover your online exercises and keep your information secure.

References

  1. Block Cipher Techniques. (n.d.). Retrieved from https://csrc.nist.gov: https://csrc.nist.gov/projects/block-cipher-techniques
  2. Mason, J. (2017, June 21). Retrieved from https://thebestvpn.com: https://thebestvpn.com/advanced-encryption-standard-aes/#uses
  3. Nohe, P. (2017, December 11). Retrieved from https://www.thesslstore.com: https://www.thesslstore.com/blog/what-are-nist-encryption-standards/
You can receive your plagiarism free paper on any topic in 3 hours!

*minimum deadline

Cite this Essay

To export a reference to this article please select a referencing style below

Copy to Clipboard
Encryption Standard and Real Life Examples. (2020, December 24). WritingBros. Retrieved October 30, 2024, from https://writingbros.com/essay-examples/encryption-standard-and-real-life-examples/
“Encryption Standard and Real Life Examples.” WritingBros, 24 Dec. 2020, writingbros.com/essay-examples/encryption-standard-and-real-life-examples/
Encryption Standard and Real Life Examples. [online]. Available at: <https://writingbros.com/essay-examples/encryption-standard-and-real-life-examples/> [Accessed 30 Oct. 2024].
Encryption Standard and Real Life Examples [Internet]. WritingBros. 2020 Dec 24 [cited 2024 Oct 30]. Available from: https://writingbros.com/essay-examples/encryption-standard-and-real-life-examples/
Copy to Clipboard

Need writing help?

You can always rely on us no matter what type of paper you need

Order My Paper

*No hidden charges

/