0 Comments

 

Instructions

Details of Project Paper (10%): You must include at least ten references.

Prepare a 10-15 page paper in Microsoft Word (counts as 10% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page). The paper should be between 2500 to 5300 words excluding the title page content and the references page content. At a minimum include the following:

  • Detailed description of the area researched
  • Technology involved in the area
  • Future trends in the area
  • Example companies involved in the area
  • Regulatory issues surrounding the area
  • Global implications for the area
  • References (minimum of 10)

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The paper must be at least 10 pages double-spaced, 1" margin all around, black 12 point font (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc… are extra – allowed but extra for the minimum page count). The title page and references are also required but don't count in the minimum page count. A minimum of 10 references are required.

The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).

Papers will be automatically added to and checked against the standard Turnitin repositories. Originality reports will be returned to the faculty and student in roughly 15 minutes of the submission. Multiple submissions are allowed.

Save the file using the following file naming convention: ISSC366_Project_First_Last.doc(x) (where first and last are your first and last names resp.) and submit the file in this assignment area.

Encryption

Cristian DeWeese

10/24/2023

American Military University

Professor Stewart

I. Introduction

a. Overview of encryption

b. Data Security and Privacy in the Digital Age.

c. Purpose of the project

II. Types of Encryption

a. Symmetric Encryption

1. Definition and explanation

2. Use cases

3. Advantages and disadvantages

b. Asymmetric Encryption

1. Definition and explanation

2. Use cases

3. Advantages and disadvantages

c. Hybrid Encryption

1. Definition and explanation

2. Use cases

3. Advantages and disadvantages

III. Encryption Algorithms

a. DES (Data Encryption Standard)

1. History and background

2. How it works

3. Security concerns

b. AES (Advanced Encryption Standard)

1. History and background

2. How it works

3. Strengths and weaknesses

c. RSA

1. Explanation of public-key encryption

2. Use cases

3. Vulnerabilities

IV. Applications of Encryption

1. Secure Communication

2. Email Encryption

3. Messaging apps

4. VPNs (Virtual Private Networks)

5. Data Storage

V. Challenges and Concerns

1. Quantum Computing Threats (Chamola, 2021)

2. Legal and Ethical Issues

3. Balancing Privacy and National Security

VI. Case Studies

a. Case Study 1: Content Moderation for End-to-End Encrypted Messaging (Mayer, 2019)

1. Description of the case

2. Outcomes and implications

b. Case Study 2: Exploring the relationship between Crypto AG and the CIA in the use of rigged encryption machines for espionage in Brazil (Brustolin, 2023)

1. Description of the case

2. Encryption’s Crucial Role

VII. Conclusion

a. Summary of key points

b. The future of encryption

c. Final thoughts on data security

VIII. References

Brustolin, V., de Oliveira, D., & dos Reis Peron, A. E. (2023). Exploring the relationship between crypto AG and the CIA in the use of rigged encryption machines for espionage in Brazil.  Cambridge Review of International Affairs36(1), 54-87. https://www.tandfonline.com/doi/abs/10.1080/09557571.2020.1842328

Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., & Hassija, V. (2021). Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography.  Computer Communications176, 99-118. https://www.sciencedirect.com/science/article/abs/pii/S0140366421002036

Mayer, J. (2019). Content moderation for end-to-end encrypted messaging.  Princeton University. https://www.cs.princeton.edu/~jrmayer/papers/Content_Moderation_for_End-to-End_Encrypted_Messaging.pdf

Order Solution Now

Categories: