• Category:
  • Document type:
  • Level:
  • Page:
  • Words:

Material Equipment

Top of Form

Top of Form

1. Web sites use encryption to protect data, and confidential information i.e. take control of their security. Encryption is basically a system that encodes a file or a message so that it can only be accessed by specific people. The Advanced Encryption Standard (AES) algorithm is the most widely trusted algorithm and is used as the standard by numerous organizations. AES being a block cipher encrypts data on per-block criteria. Because the size of each block is measured in bits, this means that the 128 bit AES operates on 128 bits of plaintext giving rise to 128 bits of ciphertext, and that is the case with both the 192 bit and 256 bit versions. It is fast because it is based on substitution-permutation network design. This principle combines both substitution and permutation making AES fast in both software and hardware. AES is a symmetric algorithm because the key used during encryption is the same one used during decryption (Lehtinen & Gangemi, 2006). SSL and TLS are used in ensuring the protected data is sent securely. One common application of website encryption is Email privacy. This keeps emails secure from prying eyes allowing one to maintain secure communications, especially regarding sensitive matters. Another application is in online accounting where the business information in a website are kept secure from hackers who may compromise the system and defraud a business (Peltier, 2005).

2. MEI might use PGP/MIME encryption in communicating with strategic partners and customers. This can be done via installing an extension, such as Mailvelope or GPGTools, and generating the company’s key. Once this is done, the key can be submitted to a keyserver for identification purposes and then listed. MEI may then search for the public keys of its customers and strategic partners and import them or add them to their keyring. Once recipients have been added to the key ring, the company can type the message via another window then encrypt and select recipients (Daemen & Rijmen, 2013). The recipients automatically recognize the encrypted message, and the extension added offers to decrypt it hence the need for a PGP decryptor or an extension on the other end. Attachments can also be encrypted before being uploaded using the same key pair. Using encrypted emails by MEI is strategic in that information is shared on a need to know basis and not compromised by other employees or competitors. Encryption also protects the confidential information from hackers who may compromise the company via disclosing private information to the public. With the growing need for security, encryption is not an option but a necessity (Tipton & Nozaki, 2012).

Security is key to a successful business or enterprise, and hence the need for online security is paramount to every organization. AES encryption algorithm is as old as it gets and the 128-bit version is hard to crack yet easy to use and can be used to encrypt both MEI’s hardware and software. Speed is also important, and the combination of both substitution and permutation makes AES quite fast. PGP/MIME encryption keeps communication with strategic partners and customers private. Attachments to be sent via email can also be encrypted before upload, and this keeps companies communication secure from hackers (Daemen & Rijmen, 2013).


Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.

Lehtinen, R., & Gangemi Sr, G. T. (2006). Computer Security Basics: Computer Security. » O’Reilly Media, Inc.».

Peltier, T. R. (2005). Information security risk analysis. CRC press.

Tipton, H. F., & Nozaki, M. K. (2012). Information Security Management Handbook, Volume 6. Auerbach Publications.