Prepare a report to address all aspects of the assignment. This report should be no less than 10 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format.
The following sections should be outlined as Headers in the paper.
Introduction, thesis statement, overview, purpose
Background, discuss history of topic
Discussion, identify benefits, obstacles, innovations
Conclusion, summarize the overall study, lessons learned
References, minimum three references with citations in the body
All written reports should be submitted in MS Word. The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper
Be prepared to present a 10 minute presentation on this assignment.
Students must submit both written assignment and presentation slides in the folder labeled “Make Up Assignment” in your iLearn course.
- The purpose of the research paper is to give a thorough review of Asymmetric Cryptography, Cryptography, Algorithms, Symmetrical Encryption, Data Integrity Algorithms, or Authentication Protocols. Select one of these topics to guide your research.
- Items that should be addressed include, but are not limited to:
- Strengths of using this form of cryptography
- Weaknesses of using this form of cryptography
- Description of algorithms that implement cryptography and strengths / weaknesses of each algorithm
- Relevant examples of modern applications / industry that utilize cryptography.
- Future use of this approach or strategy.