StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Asymmetric or Symmetric Key Encryption - Case Study Example

Comments (0) Cite this document
Summary
This paper “Asymmetric or Symmetric Key Encryption” presents an overview of two encryption techniques. The purpose of discussing these techniques is to choose one of them for XYZ Inc. Both the techniques offer certain advantages and disadvantages but the asymmetric technique should be used by XYZ Inc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Asymmetric or Symmetric Key Encryption
Read Text Preview

Extract of sample "Asymmetric or Symmetric Key Encryption"

Some of the well-known examples of symmetric key encryption comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010). Fig1 demonstrates the process of Symmetric-key encryption:
Figure 1Process of Symmetric Encryption, Image Source: (Stretch, 2010)
In addition, DES, 3DES, AES, and RC4 are some of the well-known examples of the symmetric encryption algorithm. In this scenario, 3DES and AES are widely utilized in IPsec and other types of VPNs (Stretch, 2010; KetuWare, 2004).
Asymmetric Key Encryption
Asymmetric encryption is also referred to as public-key cryptography. As compared to the symmetric encryption method in asymmetric encryption two keys are used: one for encryption and another for decryption. Basically, this encryption technique uses two keys for the data encryption: a public key and a private key. In this scenario, the public key is made available for all so it can be used to encrypt data and information by anyone who wants to send a message to the person who has the key. However, the private key is not disclosed to anyone and is employed to decrypt received data. The most commonly seen example of asymmetric key encryption is RSA (Stretch, 2010; Ezeobika, 2010). Fig2 demonstrates the process of Symmetric-key encryption:
Figure 2Process of Asymmetric Encryption, Image Source: (Stretch, 2010)
Advantages of Asymmetric Encryption
Some of the advantages of asymmetric encryption are outlined below: (Ezeobika, 2010)
Handiness: Asymmetric encryption technique effectively addresses the issue of sending the key for encryption. In fact, the users publishing their public keys and private keys are kept secret.
Excellent Support for Message Authentication: In view of the fact that the asymmetric encryption technique supports the digital signatures which allow the data receiver/sender to authenticate that the data is actually received from a specific sender.
The integrity of data: As discussed above, the use of digital signatures also ensures the integrity of data. In addition, this technique allows the receiver to become aware of if the data was modified during transmission because a digitally signed data cannot be altered without invalidating the signature.
Support non-repudiation: Digitally acknowledged data is similar to a physically signed document. In fact, it is a receipt of the data and as a result, the sender cannot refuse it.
Disadvantages
Public keys authentication: In asymmetric key encryption no user can be completely certain that a public key belongs to the person it signifies and if so everyone must confirm that their public keys belong to them.
Not Efficient: As it uses two keys so it is much slower than symmetric encryption.
Additional computer resources: Asymmetric key encryption requires a lot more computer resources as compared to symmetric key encryption.
Loss of the private key can be irreparable: If a private key lost all received data cannot be decrypted.
Conclusion
XYX Inc. should use an asymmetric encryption key to encrypt the information of genetic. This encryption technique provides higher security as it makes use of two keys: one for encryption and another for decryption. However, this technique requires more resources than symmetric key encryption.
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 words, n.d.)
Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 words. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key
(Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words)
Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key.
“Asymmetric or Symmetric Key Encryption Case Study Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/business/1597331-asymmetric-or-symmetric-security-key.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Asymmetric or Symmetric Key Encryption

Asymmetric or Symmetric Encryption

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... or Symmetric Encryption In today's scenario it is vital to secure and maintain the confidentiality of information or data. It becomes all the more imperative when it is related to the research studies encompassing set of trials, studies, endurance, intellect and rigorous efforts taken to generate a meaningful research. The methods available to encrypt data involves asymmetric and symmetric means. The present article emphasizes upon the benefits of these methods for data protection. Introduction Encryption of data is necessary in transmitting information through electronic means, to safeguard- data or information, sensitive documents and private communications made ...
2 Pages (500 words) Essay

Asymmetric Key/Symmetric Key

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Full Paper Introduction Over the years, many cryptographic algorithms have been invented. These algorithms can be categorizedinto three types, i.e. encryption algorithms, hashing algorithms, and signature based algorithms. Encryption algorithms are utilized for encrypting data to ensure privacy and protection. Hashing algorithms are utilized to ensure data is not modified during transit – that is, to ensure data integrity. Lastly, signature based algorithms are used for authentication by providing a digital or electronic signature of the user. As an ABC institute of research has to protect highly sensitive information from its rivals, we will discuss symmetric and ...
3 Pages (750 words) Essay

Encryption

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Questions 2 and 3 As evidence of your activity, make a copy of the windows detailed below and paste1 them into your TMA answer document: the New Message window at the equivalent stage to that shown in Figure 7.21 on page 76 of Book E. (This copy should be taken before you make any changes to the message.) the Open Message window at the equivalent stage to that shown in Figure 7.23 on page 77 of Book E. Question 2 (a) Complete Tables A1, A2 and A3 to illustrate the result of the Diffie-Hellman process if both principals in the transaction pick the same starting value from a limited range of possible values, and if both principals in the transaction pick differ...
6 Pages (1500 words) Essay

Asymmetric Synthesis

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... SIGNIFICANT RELATIONSHIP OF THE CATALYTIC ASYMMETRIC SYNTHESIS OF CINCHONA ALKALOIDS TO ITS INDUSTRIAL USES With man's present need to acquire significant instruments for the effective asymmetric synthesis of compound organic molecules, the study of catalytic asymmetric synthesis has become an important aspect of organic chemistry. Generally, popular catalysts which are usually used by organic chemists utilize transition metals in order to trigger a chemical reaction in the presence of a chiral ligand (Noyori, 1994.) However, as modern chemistry continues to discover catalytic systems which are organic, the popularity of cinchona alkaloids has become a famous cata...
4 Pages (1000 words) Essay

Asymmetric Information

...Asymmetric or Symmetric Key Encryption... 331 i. Futures Contract - A standardized, transferable, exchange-traded contract that requires delivery of a commodity, bond, currency,or stock index, at a specified price, on a specified future date. (InvestorWords.com) ii. Call Option - An agreement that gives an investor the right (but not the obligation) to buy a stock, bond, commodity, or other instrument at a specified price within a specific time period. (Investopedia.com) iii. Put option - An option contract giving the owner the right, but not the obligation, to sell a specified amount of an underlying security at a specified price within a specified time. This is the opposite of a call option, which gives the holder the right to buy shares. (i...
4 Pages (1000 words) Article

Public Key Encryption and Digital Signature

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... a) Assuming that you have access to 10,000 up-to PCs and stating any other reasonable assumptions you need to make, calculate how long itwill take, on average, to derive an AES key using a key space search (sometimes referred to as a brute force attack). b) Explain the comparative advantages and disadvantages of public key and private key cryptography. For each cryptography type: name and give outline information for ONE common cipher (excluding AES). Solution 1. Security and Convenience The primary advantage of public-key cryptography is increased security and convenience because private keys are never transmitted or revealed to anyone. By contrast, in a priva...
17 Pages (4250 words) Assignment

Asymmetric Information

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Information Asymmetric information is a concept where one person has a thorough knowledge about the transaction where as the other person is left clueless. This situation is trickier in financial markets. Since the financial markets deal with money borrowing, lending, stock exchange and other money related transactions, the probability of asymmetric information is higher. People involved in financial transactions must be provided with prior information which will avoid unnecessary problems that may arise during the transaction. Asymmetric information leads to various risks as the one who has previous knowledge about the transaction tends to take advantage of the...
2 Pages (500 words) Essay

Data Encryption

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Encryption By Software Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by it Your reasons why you decided to check it out (first impression) Your overall evaluation of it, to the degree that you can judge; is it something youd use?  Why? (Please comment also on the effectiveness of the demo itself) PGP Whole Disk Encryption http://www.symantec.com/business/whole-disk-encryption http://www.symantec.com/content/en/us/enterprise/fact_sheets/b-pgp_whole_disk_encryption_DS_21064414.en-us.pdf PGP completes Disk Encryption from Symantec Corporation that offers organizations with complete, supreme perform...
2 Pages (500 words) Essay

Mathematical Focus on RSA Public & Private Key encryption

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Mathematical Focus on RSA Public & Private Key encryption A digital signature is a mathematical scheme that consists of three parts, namely a key generation signing algorithm, a signing algorithm and a signature verifying algorithm, and they are used in e-commerce. In the United States of America, and the European Union, there are laws regulating the use of digital signatures. This paper takes a look at the various legal standings of digital signatures and their relations to RSA public and private key. It gives a mathematical analysis on how the digital signature occurs, and its elements (Batten, 32). The United States code gives a definition of an electronic sig...
5 Pages (1250 words) Research Paper

Report on Public Key Encryption

...Asymmetric or Symmetric Key Encryption... Asymmetric or Symmetric Key Encryption... Key Encryption The world has become electronic in almost all its activities. Therefore, there is need to provide an identifier for online users. As a result, the public key encryption provides an identity to the world. This mainly affects those who seek to find data or information online. Moreover, technology needs to be secure to avoid fraudsters from tampering with vital information. Consequently, people need a passport or identification to access online information. However, public key encryption makes use of long numbers. These numbers are known as keys (Ferguson & Schneier, 2003 p18). The process becomes more secure when the numbers are longer. There are two...
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Asymmetric or Symmetric Key Encryption for FREE!

Contact Us