Kyle Peterson

ITS-370

Chapter Eight

10/13/17

Exercises

1.      Amazon E-commerce Protocols

The code on the shopping page is encrypted heavily, in fact it won’t even let you open and check the properties enabled in the code. With that aside the page has roughly 15,000 lines of code… that’s a lot of code! I would imagine it would not be easy to crack into amazon’s payment system. Their security and encryption is probably a lot better than an md5 hash.

2.      Ebay E-Commerce Protocols

As expected, eBay has a different form of encrypting its data. I would imagine somewhat similar to Amazon, only it also priorities PayPal over normal Credit and Debit cards. Different payment methods I would imagine call for different coding methods. Much like with Amazon, I would imagine hacking into the system would not be very easy to do.

3.      Symantec Desktop Email Encryption

Considering this is a school computer, I am unable to download the application. However, The site states that it allows for email encryption. A great quote from Symantec themselves: “Protect your data in email, whether in transit or at rest. Symantec Desktop Email Encryption provides an end-to-end email encryption solution that automatically encrypts and decrypts email directly between clients without the need to log into a third-party website. Email remains encrypted on internal mail servers or when email is outsourced to the cloud”.

I think this rightfully sums up this exercise, no emails today Shin-Ping L

4.      Announcing the Advanced Encryption Standard (AES)

Introduction to the AES standard

This standard specifies the Rijndael algorithm ([3] and [4]), a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits. Rijndael was designed to handle additional block sizes and key lengths, however they are not adopted in this standard. Throughout the remainder of this standard, the algorithm specified herein will be referred to as “the AES algorithm.” The algorithm may be used with the three different key lengths indicated above, and therefore these different “flavors” may be referred to as “AES-128”, “AES-192”, and “AES-256”.

This specification includes the following sections:

·         Definitions of terms, acronyms, and algorithm parameters, symbols, and functions;

·         Notation and conventions used in the algorithm specification, including the ordering and numbering of bits, bytes, and words;

·         Mathematical properties that are useful in understanding the algorithm;

·         Algorithm specification, covering the key expansion, encryption, and decryption routines;

·         Implementation issues, such as key length support, keying restrictions, and additional block/key/round sizes.

 

5.      Steganographic Tools

Once again, I cannot download applications onto the school computers. However Steganography is pretty cool. Steganography is: The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information.

Steganography is basically a Trojan horse.