Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

NIST Special Publication 8 0 0 - 1 7 5 B Revision 1 - Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms

NIST Special Publication 800-175B Revision 1- Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
NIST SP 800-175B provides guidance to the (US) Federal Government for using cryptography and NIST's cryptographic standards to protect sensitive but unclassified digitized information during transmission and while in storage. The cryptographic methods and services to be used are discussed.
ITSP.40.111- Canadian Centre for Cyber Security - Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information
ITSP.40.111 provides guidance on the use of Communications Security Establishment (CSE) approved cryptographic algorithms to protect UNCLASSIFIED, PROTECTED A, and PROTECTED B information. For requirements on the use of CSE-approved cryptography to protect PROTECTED C and Classified information, refer to CSE's ITSD-01A: IT Security Directive for the Application of Communications Security using CSE-Approved Solutions.
Canadian Government - Levels of Security
Description of different levels of security for sensitive government information and assets, organizations and personnel.
Questions
Q1) As of 2021, which block cipher symmetric encryption algorithms are approved/common to both the Canadian and US governments for applying cryptographic protection (i.e. encrypting)?
Q2) Which block cipher symmetric encryption algorithm is approved by the Canadian government for applying cryptographic protection (i.e. encrypting) but not the US government?
Q3) What is the principle reason DES-56 bit is no longer considered secure?(Chapter 4- Cryptography and Network Security)
Q4) Describe a simple application where DES-56 might be considered computationally secure?(Review the definition/criteria of "computationally secure" in Chapter 3- Cryptography and Network Security)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Programming Languages 12th International Symposium Dbpl 2009 Lyon France August 2009 Proceedings Lncs 5708

Authors: Philippa Gardner ,Floris Geerts

2009th Edition

3642037925, 978-3642037924

More Books

Students also viewed these Databases questions

Question

Which are non projected Teaching aids in advance learning system?

Answered: 1 week ago