Cryptography in Work Environment Paper

Cryptography in Work Environment Paper

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Job Title: Software Engineer


Characteristics of quantum cryptography.

Match symmetric key algorithms to their corresponding descriptions.

Distinguish between types of asymmetric algorithms.

Recognize types of ciphers.

Types of cryptanalytic attacks with their corresponding descriptions.

Characteristics of message authentication codes.

Characteristics of digital signatures.

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.