Sign In
Not register? Register Now!
You are here: HomeOther (Not Listed)Technology
Pages:
7 pages/≈1925 words
Sources:
No Sources
Level:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 37.8
Topic:

Networking Technology Other (Not Listed) Research Paper (Other (Not Listed) Sample)

Instructions:

this was a student's test paper. This paper was based on numbered questions that I was supposed to answer in order.

source..
Content:


NETWORK TEST
Student’s Name
Institution Affiliation
Professor
Date
Section A
Question One
The total processing speed of microprocessors (based on the clock rate and the number of the circuit) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong: How long will a symmetric session key have to be in 30 years to be considered strong? -5Marks
To ensure the security of crucial data, encryption is essential. Algorithms employed in data encryptions are different and of unique edifices that need the user to have keys necessary to decrypt the data. The symmetric session key allows the encryptor to set a key that matches the key used for decryption. However, this form of encryption algorithm can be exploited through the brute-forcing of the key over a password or dictionary list or the generation of random character values that are tested against the data provided. For small keys, the process can be reasonably fast, but when the key is long, the process can take very long. Modern-day computer processors can handle the brute-forcing process pretty soon as opposed to the traditional processors. It is possible to find processors on GPU cards that are specifically designed to have a high computing power that can be able to handle the brute-forcing process. Also, with quantum computers, the process is further enhanced, and it can be able to brute force the key used in a matter of hours even when the key is long. A high processing power renders this form of encryption to be unusable as it can only take a matter of hours or days to have the key generated. If the processing speed in quantum computers is used, then the process will be less challenging as the decryption can be performed in a matter of minutes, even with long keys more than 100 bits long.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Small Business Opportunities in the Global Market Technology Essay
    Description: The development or advancement in technology has consequently led to globalization as it has led to efficient means of transportation and communication on a global scale. Globalization has opened channels for entrepreneurs to establish new businesses within the international arena....
    3 pages/≈825 words| 3 Sources | APA | Technology | Other (Not Listed) |
  • How Internet Helped The Victims Find Shelter During Superstorm
    Description: The New York City was adversely affected by the super storm Sandy in 2012. The technology was sensibly used in the situation where the victims were left homeless....
    2 pages/≈550 words| 2 Sources | APA | Technology | Other (Not Listed) |
  • A Reflection On The Data Communications Class Discussions And Readings
    Description: As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been...
    2 pages/≈550 words| No Sources | APA | Technology | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!