StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Asymmetric or Symmetric Key Encryption - Case Study Example

Cite this document
Summary
This paper “Asymmetric or Symmetric Key Encryption” presents an overview of two encryption techniques. The purpose of discussing these techniques is to choose one of them for XYZ Inc. Both the techniques offer certain advantages and disadvantages but the asymmetric technique should be used by XYZ Inc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Asymmetric or Symmetric Key Encryption
Read Text Preview

Extract of sample "Asymmetric or Symmetric Key Encryption"

Some of the well-known examples of symmetric key encryption comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010). Fig1 demonstrates the process of Symmetric-key encryption:Figure 1Process of Symmetric Encryption, Image Source: (Stretch, 2010)In addition, DES, 3DES, AES, and RC4 are some of the well-known examples of the symmetric encryption algorithm. In this scenario, 3DES and AES are widely utilized in IPsec and other types of VPNs (Stretch, 2010; KetuWare, 2004).

Asymmetric Key EncryptionAsymmetric encryption is also referred to as public-key cryptography. As compared to the symmetric encryption method in asymmetric encryption two keys are used: one for encryption and another for decryption. Basically, this encryption technique uses two keys for the data encryption: a public key and a private key. In this scenario, the public key is made available for all so it can be used to encrypt data and information by anyone who wants to send a message to the person who has the key.

However, the private key is not disclosed to anyone and is employed to decrypt received data. The most commonly seen example of asymmetric key encryption is RSA (Stretch, 2010; Ezeobika, 2010). Fig2 demonstrates the process of Symmetric-key encryption:Figure 2Process of Asymmetric Encryption, Image Source: (Stretch, 2010)Advantages of Asymmetric EncryptionSome of the advantages of asymmetric encryption are outlined below: (Ezeobika, 2010)Handiness: Asymmetric encryption technique effectively addresses the issue of sending the key for encryption.

In fact, the users publishing their public keys and private keys are kept secret.Excellent Support for Message Authentication: In view of the fact that the asymmetric encryption technique supports the digital signatures which allow the data receiver/sender to authenticate that the data is actually received from a specific sender.The integrity of data: As discussed above, the use of digital signatures also ensures the integrity of data. In addition, this technique allows the receiver to become aware of if the data was modified during transmission because a digitally signed data cannot be altered without invalidating the signature.

Support non-repudiation: Digitally acknowledged data is similar to a physically signed document. In fact, it is a receipt of the data and as a result, the sender cannot refuse it. DisadvantagesPublic keys authentication: In asymmetric key encryption no user can be completely certain that a public key belongs to the person it signifies and if so everyone must confirm that their public keys belong to them.Not Efficient: As it uses two keys so it is much slower than symmetric encryption. Additional computer resources: Asymmetric key encryption requires a lot more computer resources as compared to symmetric key encryption.

Loss of the private key can be irreparable: If a private key lost all received data cannot be decrypted. ConclusionXYX Inc. should use an asymmetric encryption key to encrypt the information of genetic. This encryption technique provides higher security as it makes use of two keys: one for encryption and another for decryption. However, this technique requires more resources than symmetric key encryption.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 words, n.d.)
Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 words. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key
(Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words)
Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key.
“Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key.
  • Cited: 0 times

CHECK THESE SAMPLES OF Asymmetric or Symmetric Key Encryption

Asymmetric Key/Symmetric Key

Likewise, to ensure reliable safety, ABC institute of research can implement symmetric key algorithm techniques, as they do not impose high overhead due to single key processing as well as low encrypted file size.... encryption algorithms, hashing algorithms, and signature based algorithms.... encryption algorithms are utilized for encrypting data to ensure privacy and protection.... As an ABC institute of research has to protect highly sensitive information from its rivals, we will discuss symmetric and asymmetric encryption algorithms in this scenario....
3 Pages (750 words) Essay

Encryption Exploitation Technologies

In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007).... The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011).... This paper ''encryption Exploitation Technologies'' discusses that encryption is a term in data security and privacy which refers to the processes through which original information (plain text) is converted into ciphertext, which is a form of data that is difficult to interpret....
6 Pages (1500 words) Research Paper

Trusted Platform Module Components and Keys

The artifacts may include passwords, encryption keys or certificates.... In summary, the TPM has four main functions which include platform monitoring, secure storage, encryption operations and authentication services (Hewitt, 2006).... The RSA key generator, RSA encryption/decryption and SHA-1 engine must be included in its functionality (Microsoft 2012).... If RSA encryption is not used when a signing is done within the TPM, it stands the risk of being rejected by other TPM devices....
5 Pages (1250 words) Research Paper

Network and Internet Security

Asymmetric encryption (Public key encryption) - requires the use of a two keys where one is a private key and the other is a public key which is known to a number of people.... The other challenge faced with the shared secret key encryption is the fact that the higher the messages that are being sent on the communication channel by the hosts, their corresponding keys will also be increased.... Hybrid encryption (single key and public key) – this technique used both the symmetric and asymmetric encryption techniques....
6 Pages (1500 words) Essay

Communication Technology Design for Confidentiality and Quality Monitoring of CV Service

In 1976 the idea of public key encryption was introduced to the field of cryptography.... Public key encryption techniques or asymmetric key systems avoid the need to distribute keys in secret.... symmetric key systems are those which allow the decryption process to be derived from the encryption key.... Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans....
6 Pages (1500 words) Essay

Class student dicussions answers

I agree with you Jusin G that symmetric key distribution can pose to bring lots of insecure communication or message interception between the involved organizations.... I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of passing data across a wireless network than WEP.... Good analysis of the encryption for wireless networks you Pavitor.... disagree with you Jusin G concerning WEP encryption....
2 Pages (500 words) Assignment

Questions in Network Security

dvantages of combined a/symmetric cryptography over both cryptographies In symmetric key encryption (secret key encryption) method, data is scrambled by pressing same key to both decrypt and encrypt it while in asymmetric encryption (public key encryption), different keys are used to decrypt and encrypt.... In addition to this, asymmetric encryption allows sharing of key since decryption key is kept to oneself while with symmetric key encryption, the key have to be kept secret....
1 Pages (250 words) Coursework

The Nature of Encryption Exploitation Technologies

In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007).... The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able to access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011).... This coursework "The Nature of encryption Exploitation Technologies" gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies, the processes of converting original information into ciphertext....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us