Imagine yourself as the CIO of an engineering and software development company that has federal, military, and civilian customers. You must ensure that all your company’s information, as well as data exchanged with your customers, is properly encrypted using known, accepted standards.
Select the encryption component from a major standard, such as NIST, ANSI, IEEE, IETF, or ISO, for your company.
Describe the encryption component of the standard, its pros and cons, and justify your selection.
Discuss whether you would communicate with your customers using an asymmetric or symmetric algorithm, and why, and rationalize the type of algorithm you would use, such as RSA or DES.
After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:
Discuss what you learned.
Ask probing questions or seek clarification.
Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
Suggest research strategies or specific resources on the topic.
As CIO of an engineering and software development company serving federal, military, and civilian customers, ensuring robust and compliant encryption for all data, both internal and exchanged with clients, is paramount. Given the sensitive nature of operations for these customers, adherence to established, internationally recognized standards is not just a best practice, but a mandatory requirement for maintaining trust and securing contracts.
For our company, I would select the Advanced Encryption Standard (AES) as the primary encryption component, as defined and specified by the National Institute of Standards and Technology (NIST) in FIPS Publication 197.
Description of AES (NIST FIPS 197):
AES is a symmetric-key block cipher adopted by the U.S. government to protect classified information. It operates on fixed-size blocks of data (128 bits) and uses key sizes of 128, 192, or 256 bits. Unlike its predecessor DES, AES is not based on a Feistel network but rather a substitution-permutation network. This means it performs a series of transformations on the data block, including byte substitution, shifting rows, mixing columns, and adding round keys. The number of rounds depends on the key size (10 rounds for 128-bit keys, 12 for 192-bit keys, and 14 for 256-bit keys).
Pros of AES:
Cons of AES: