Writing Homework Help
HU Wk 3 Data Encryption Standard Cryptography Security & Forensics Discussion
- Week 3 OverviewThe objective of this chapter is to illustrate the principles of modern symmetric ciphers. For this purpose, we focus on the most widely used symmetric cipher: the Data Encryption Standard (DES). Although numerous symmetric ciphers have been developed since the introduction of DES, and although it is destined to be replaced by the Advanced Encryption Standard (AES), DES remains the most important such algorithm. Furthermore, a detailed study of DES provides an understanding of the principles used in other symmetric ciphers.
Objectives
ObjectivesBy the end of this week, you should be able to:
- Understand the difference between stream ciphers and block ciphers.
- Present an overview of Data Encryption Standard (DES).
- Discuss the cryptographic strength of DES.
Learning Materials
Learning Materials Read Chapter 4 and 7
Chapter 4 PowerPoint Chapter 4 PowerPoint – Alternative Formats
Chapter 7 PowerPoint Chapter 7 PowerPoint – Alternative Formats Week 3 recorded lecture
-
Week 3 Discussion Posting
After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other students in the class by the end of the week. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.
Milestone 1
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to omplete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
-
Q uiz 2
Your q uiz is timed. You have 10 minutes to complete. You only have one opportunity to c omplete the qu iz.
-
Week 2 Reading Assignments
Week 2 Reading AssignmentsBook Title:Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Forensic InvestigationsAuthor: John BlairYear of Publication: 2018ISBN: 978-0-12-811056-0Chapters3 and 4
Individual Project Assignment Instructions
– Alternative Formats
Week 2 Individual Project
Based on your reading, knowledge, and personal research, please answer the following according to the assignment instructions.
- What is Cell Phone Forensics?
- Explain logical and physical data
- What is Visual Validation, and why is it important?
- Explain the Faraday technique
- Explain consent to search as it relates to the legal process of cell phone forensics
- What is Target Llanguage as it relates to Device?
Week 2 Discussion Board
Week 2 Discussion BoardFor this assignment, please discuss the following according to the instructions provided in the course syllabus.
- How does the Fourth Amendment relate to the legal process of digital forensics?
- How do exigent circumstances apply to the legal process?
- Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
- Explain CDMA and GSM, their significance as it relates to the cellular network.