# This activity will explore some aspects of the U.S. standard encryption algorithm, AES (Advanced Encryption Standard), which was mentioned in the notes. It succeeds the previous standard, DES (Data Encryption Standard). DES has become possible to be broken by brute-force guessing in a short time due to its relatively short key length, which is 56 bits.

This activity will explore some aspects of the U.S. standard encryption algorithm, AES (Advanced Encryption Standard), which was mentioned in the notes. It succeeds the previous standard, DES (Data Encryption Standard). DES has become possible to be broken by brute-force guessing in a short time due to its relatively short key length, which is 56 bits. 150 150 Affordable Capstone Projects Written from Scratch

This activity will explore some aspects of the U.S. standard encryption algorithm, AES (Advanced Encryption Standard), which was mentioned in the notes. It succeeds the previous standard, DES (Data Encryption Standard). DES has become possible to be broken by brute-force guessing in a short time due to its relatively short key length, which is 56 bits. `

Use the textbook, course material, and independent research to write a brief paper on the following:

• Explain the three key sizes for AES encryption.
• Make a reasonable guess as to computation time to guess one key.
• Use Test Protect. (n.d.). AES calculator. Retrieved from http://testprotect.com/appendix/AEScalc and calculate the time to brute force the keys.
• Try to encrypt a plaintext of your choice with AES (any key size). You may use any AES encryption tool (e.g., AES Crypt from https://www.aescrypt.com/download/) or any online AES encryption service.

o Here are some examples:

• Confirm that the encryption was valid by decrypting the ciphertext back to the original plaintext. Describe the AES version, plaintext, key, and ciphertext.
• Explain what a block cipher is and where it might be used?
• Give examples of different types of block ciphers and their uses.
• What are the goals of network security?
• Compare and contrast the differences between a stream cipher and hash function?

The paper should be 2 to 3 double-spaced pages in length, using 12-point font and 1-inch margins. You should fully cite all your sources, using APA guidelines for writing and citations. Post your work to the dropbox.

Compose your work using a word processor (or other software as appropriate) and save it frequently to your computer. Be sure to check your work and correct any spelling or grammatical errors before you upload it. When you are ready to submit your work, click “Browse My Computer” and find your file. Once you have located your file, click “Open” and, if successful, the file name will appear under the Attached files heading. Scroll to the bottom of the page and click “Submit.”

Reference

Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall.

Evaluation Criteria
Review the CYS504_M1A1_Lab  Rubric by clicking on the “View Rubric” button at the top of this page, or by going to the “Start Here-Course Information” section of the course to see more information on grading criteria. The lab assignments, together, make up 25% of the total course grade.

TO GET THIS OR ANY OTHER ASSIGNMENT DONE FOR YOU FROM SCRATCH, PLACE A NEW ORDER HERE