# Discussion and assignment

**Mohammedumar**

Discussion:

**In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability.** **Why are these factors so important to businesses?**

Assignment:

- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to communicate via a symmetric cipher?
- 2.4 What is the difference between a block cipher and a stream cipher?
- 2.5 What are the two general approaches to attacking a cipher?
- 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
- 2.7 What is triple encryption?
- 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

- 2 years ago
- 5

**Answer(2)**

Purchase the answer to view it

ok5150

- Discussion.docx
- Assignment.docx

Purchase the answer to view it

NOT RATED

**other Questions(10)**

- EconomicStatsJob
- "For QualityProfessor Only"
- Learning Activity #1
- ECN211..
- English quiz on schoology
- Need A+++++ work in 5 hours..!
- MGMT 520 Complete Course All Discussions Assignments Midterm and Final Exam Version 2014
- MGMT 520 Scenario Summary Week 6 Keller
- Effects of Mass Media Paper
- PSY 104 Week 3 DQ 1 Child and Adolescent Safety Statistics

### information security

- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to …

2 years ago### Network Security

- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to …

2 years ago### Network security week 2

**2.1 What are the essential ingredients of a symmetric cipher?**

**2.2 What are the two basic functions used in encryption algorithms?**

**2.3 How many keys are required for …**

2 years ago### Network Security

2.1 What are the essential ingredients of a symmetric cipher?

2.2 What are the two basic functions used in encryption algorithms?

2.3 How many keys are required for two people to communicate via a …

a year ago### 3 different assignments with 900 words in total

3 different assignments with 900 words in total

a year ago### Discussion-2

- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to …

a year ago### homework help - N

NOT RATED- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to communicate …

2 years ago### Network Security: Assignment2

NOT RATED- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to …

a year ago### List the following briefly each question in 25 words

NOT RATED- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to communicate …

4 months ago### Encryption Questionnaire

NOT RATED- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to …

4 months ago