Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Essay

Encryption Technologies in Private and Public Sectors

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
20-08-2025
Written in
2025/2026

Encryption Technologies in Private and Public Sectors

Content preview

1




Encryption Technologies in Private and Public Sectors

Author’s Name

Department/University

Course number

Course name

Instructor’s Name

, 2


Encryption Technologies in Private and Public Sectors

Introduction to Encryption

The essential cybersecurity procedure known as encryption converts readable plaintext

data into unreadable ciphertext using algorithmic keys. This operation enables the protection of

secret data by maintaining its confidentiality through secure unauthorized access (Stallings,

2017). Three essential terms exist for comprehending encryption:

Symmetric Encryption: Utilizes a single key for both encryption and decryption. The

encryption algorithms known as AES and Blowfish belong among these common examples

which Schneier (2015) mentions.

Asymmetric Encryption: Employs a pair of keys — a public key for encryption and a

private key for decryption. RSA together with ECC represent two widely used examples (Rivest

et al., 1978).

Both encryption methods create results through different mechanics because they use

opposing approaches. An assessment follows to define essential differences and choose

appropriate encryption approaches based on the application. This evaluation integrates the

fundamentals of symmetric and asymmetric encryption devices for application by experts and

beginners in cryptography (Device Authority, 2025).

Hashing: Data hashing produces a fixed-length value to verify integrity which is

extensively used for data confirmation purposes. SHA-256 represents a popular hashing

algorithm that people frequently utilize (Stallings, 2017). The main use of hash tables emerges

from hashing functions. Chosen data pairs in a list organize themselves using hash tables that

enable index-based access. Unlimited keys become table indices following hashing due to the

absence of a limit on key or value pair numbers. The hash value creates an index to locate

, 3


specific data contents held in the structure. The outcome from mathematical hashing algorithms

produces hash values known as hashes. The prevention of key retrieval from hashes depends on

one-way hashing across all good hash functions according to Yazar (2025).

Digital signatures: Asymmetric encryption through digital signatures enables clients to

authenticate data and verify its unmodified state (Singh, 2000). Encryption stands as a critical

element that ensures the privacy of personal information provides communication protection and

guards major infrastructure networks. The absence of encryption will allow attackers to intercept

sensitive information thus compromising privacy causing financial losses and threatening

national security (Schneier, 2015).

Research on Encryption Technologies

1. Advanced Encryption Standard (AES)

Technical Specifications

NIST set AES in 2001 as a symmetric encryption standard after establishing it through

the National Institute of Standards and Technology. AES protects encryption through

substitution-permutation networks and accepts encryption keys of 128, 192, and 256 bits (NIST,

2001). A layer of security develops through the cryptographic procedure which consists of

several substitutions combined with permutations as well as mixing procedures.

Use Cases

The private sector secures financial transactions, and cloud storage and utilizes virtual

private networks (VPNs) with AES. (Schneier, 2015).

The Public Sector employs AES to protect classified information along with military

information systems as well as police databases (Singh, 2000).

Strengths and Weaknesses

Document information

Uploaded on
August 20, 2025
Number of pages
7
Written in
2025/2026
Type
ESSAY
Professor(s)
Unknown
Grade
A+

Subjects

$25.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
samsonvarghese

Get to know the seller

Seller avatar
samsonvarghese writers.ph
View profile
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
8 months
Number of followers
0
Documents
51
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions