Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
COLLEGE OF ARTS & SCIENCES
Program: Bachelor of Science in Information Technology
Specialization: NDM/WMAD
CHAPTER 6 ASSESSMENT
ITPC12: SOCIAL ISSUES & PROFESSIONAL PRACTICE
First Semester, SY 2021-2022
Name: Jesse A. Bautista
Section: BSIT-4D
Code: A312
Subject: ITPC12
Date: January 05, 2022
I. LEARNING ACTIVITIES
Explain how encryption works.
Encryption uses algorithms to scramble your information. It is then
transmitted to the receiving party, who is able to decode the message with a
key. There are many types of algorithms, which all involve different ways of
scrambling and then decrypting information.
II. ASSIGNMENT
State the simple algorithm of Encryption through the following operations:
Authentication:
Authentication is used by a server when the server needs to know exactly who
is accessing their information or site.
In authentication, the user or computer has to prove its identity to the server or
client.
Usually, authentication by a server entails the use of a user name and
password. Other ways to authenticate can be through cards, retina scans, voice
recognition, and fingerprints.
In order to communicate securely and maintain confidentiality over the
internet, both encryption and integrity are crucial. You cannot have
guaranteed confidentiality without integrity. Authenticated encryption
combines encryption and MAC constructions to ensure full security.
The following narrative uses a simplified TCP-IP construction to
illustrate the necessity of message integrity to ensure confidentiality.
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
COLLEGE OF ARTS & SCIENCES
Program: Bachelor of Science in Information Technology
Specialization: NDM/WMAD
CHAPTER 6 ASSESSMENT
ITPC12: SOCIAL ISSUES & PROFESSIONAL PRACTICE
First Semester, SY 2021-2022
Name: Jesse A. Bautista
Section: BSIT-4D
Code: A312
Subject: ITPC12
Date: January 05, 2022
I. LEARNING ACTIVITIES
Explain how encryption works.
Encryption uses algorithms to scramble your information. It is then
transmitted to the receiving party, who is able to decode the message with a
key. There are many types of algorithms, which all involve different ways of
scrambling and then decrypting information.
II. ASSIGNMENT
State the simple algorithm of Encryption through the following operations:
Authentication:
Authentication is used by a server when the server needs to know exactly who
is accessing their information or site.
In authentication, the user or computer has to prove its identity to the server or
client.
Usually, authentication by a server entails the use of a user name and
password. Other ways to authenticate can be through cards, retina scans, voice
recognition, and fingerprints.
In order to communicate securely and maintain confidentiality over the
internet, both encryption and integrity are crucial. You cannot have
guaranteed confidentiality without integrity. Authenticated encryption
combines encryption and MAC constructions to ensure full security.
The following narrative uses a simplified TCP-IP construction to
illustrate the necessity of message integrity to ensure confidentiality.