answersLogoWhite

0


Best Answer

Probably the best choice would be to use AES (Advanced Encryption Standard) encryption with a 256 bit key size. There are actually at least 3 different key sizes that can be used with AES - 128, 192, and 256 bits. The longer keys require a little more computational overhead but are more secure. The AES ciphers have been analyzed extensively and are now used worldwide. AES was announced by NIST as U.S. Federal Information Protection Standard (FIPS) Publication 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before one was chosen to become "AES". The actual cipher chosen by NIST to be publicised under the appellation of AES was the Rijndael cipher submitted by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. It became effective as a Federal government standard on May 26, 2002 after approval by the Secretary of Commerce. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information. AES can be implemented in software, but it also lends itself to hardware implementations. AES encryption chips allow much faster encryption of data since all the steps of the encryption are hardwired into the chip. The chips are not horribly expensive and the performance improvement versus software implementations of AES can make the price worth it.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which cryptography should be use to encrypt the data for an online service provider if the liability is the number one consideration?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is encrypt in Tagalog?

"Encrypt" in Tagalog is "enkripto" or "isalansan ang mga datos."


Does symmetric cryptography use the same key to encrypt and decrypt a message?

Yes


What is symmetric cryptography?

There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.


What is secret key cryptography?

In secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key (or some set of rules) to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.


What are plain text and cipher text?

Plain text is a simple text which is written without any formating. Whereas, Cypher is an algorithm used in cryptography to encrypt the plain text and resulting/encyypted text is called as Ciphertext.


How many different keys will be required to give four people the ability to encrypt and decrypt the message using a symmetric cryptography algorithm?

ONEAnswer Explanation: Only one key would be required for everyone to be able to encrypt and decrypt the message. Symmetric cryptography uses the same "shared secret" key for encrypting and decrypting a message. A message encrypted using a symmetric encryption algorithm can be decrypted by anyone with the key. For this reason it is very important to ensure that the key is protected from unauthorized use. One of the primary security issues surrounding the use of symmetric cryptography is the method used to transport the key to users who need it, as most forms of communication are susceptible to eavesdropping.


What is an symmetric cryptography?

both parties share the same key to encrypt and decrypt- Symmetric encryption means that an encrypted file can be decoded simply by reversing the way it was coded. If we consider it in terms of a padlocked box, the same key that was used to lock it, can be used to open it once again.In terms of files this means that if you encrypt a file using a password, that same password can be used by anyone who knows it, to decrypt the data. The disadvantage of this is that whenever you encrypt a file and send it to someone, you must make sure that person also knows the password you used.This is why asymmetric encryption exists whereby one person can encrypt and send a file to someone else using "public key cryptography". The short definition of this is that encrypted data is not decrypted in the same way which means that there is no need to have a prearranged password.


What does ciphered mean?

In cryptography a cipher is a code used to encrypt or decrypt a coded message. The cipher is the "key" that unlocks the message. So a message (or computer file) that has been encryption coded has been ciphered and must be decoded (deciphered) before it can be read.


What is creptogrphy?

Cryptography is the study and practice of obscuring information by writing it in a way that only a select group of people can read it. This may be accomplished by simply substituting letters. For example, if Steven wanted to encrypt his name, he could substitute each of his letters with another letter three places further into the alphabet. This would result in "Vwhyhq". This is one of the simplest methods of cryptography and as such, one of the easiest to crack. Properly secure cryptography involves passwords and complicated algorithms and can thus only be efficiently implemented via computer.


What is secret key?

In secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key (or some set of rules) to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.


How do you encrypt pictures?

You can encrypt pictures using the Encrypt4all program.


What is the past tense of encrypt?

The past tense of encrypt is encrypted.