StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Asymmetric Key/Symmetric Key - Essay Example

Cite this document
Summary
Full Paper Title Name University Introduction Over the years, many cryptographic algorithms have been invented. These algorithms can be categorized into three types, i.e. encryption algorithms, hashing algorithms, and signature based algorithms. Encryption algorithms are utilized for encrypting data to ensure privacy and protection…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Asymmetric Key/Symmetric Key
Read Text Preview

Extract of sample "Asymmetric Key/Symmetric Key"

Download file to see previous pages

Encryption Methods A symmetric encryption algorithm is constructed on the foundation of shared key information between the two ends or parties involved in the communication (Misra, Woungang, & Misra, 2009). If the sender utilizes the secret key to encrypt the information or message, the recipient will also use the same key for decrypting the message or information. Symmetric keys have advantages over other encryption techniques, as they are efficient in terms of saving energy (Misra, Woungang, & Misra, 2009).

Moreover, symmetric encryption consumes less processing power and is comparatively faster. The size of the encrypted file is equal or less in comparison with the original file size. Furthermore, there are issues associated with key agreement, as they will impact the scalability of networks. In addition, the keys for encryption and decryption cannot be utilized by digital signatures (Symmetric and asymmetric ciphers, n.d.). An asymmetric encryption algorithm utilizes two keys for encrypting and decrypting the information or the message.

Accordingly, the process is comparatively slower due to the processing of two keys. Moreover, the size also matters in a limited bandwidth network, as asymmetric encryption constructs larger encrypted file sizes. However, scalability or the increase in users is addressed and has no issues (Symmetric and asymmetric ciphers, n.d.). Furthermore, asymmetric encryption addresses confidentiality issues by encrypting the information and supports integrity and non repudiation by supporting digital signatures (Symmetric and asymmetric ciphers, n.d.).

Applying Encryption Methods After discussing the advantages and disadvantages, we will now apply these techniques to the current scenario. ABC institute of research has a collaboration with XYZ inc. for performing research on genetics. The collaboration concludes that a computer network is involved in accessing highly sensitive information. Likewise, to ensure reliable safety, ABC institute of research can implement symmetric key algorithm techniques, as they do not impose high overhead due to single key processing as well as low encrypted file size.

However, this method will not address confidentiality, integrity, and non repudiation at the same time. One more solution for addressing all the issues at the same time is to deploy both asymmetric and symmetric algorithm techniques altogether. Both of these techniques will address confidentiality, integrity, and non repudiation. However, before implementing both of these techniques simultaneously, ABC institute of research must ensure following objectives have been achieved: The encryption solution must be secure in every aspect The encryption and decryption process must not take a long time and should not put an overhead on the network.

The size of the cipher must be compressed The encryption solution must also address the scalability issues The distribution of the keys must also be addressed Employing Advanced Encryption Techniques ABC institute of research can also incorporate quantum encryption techniques. However, these next generation encryption techniques are still in research and development and are not widely adopted. It is the most advanced form of cryptography called “quantum cryptography”

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Asymmetric Key/Symmetric Key Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Asymmetric Key/Symmetric Key Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1451361-asymmetric-key-symmetric-key
(Asymmetric Key/Symmetric Key Essay Example | Topics and Well Written Essays - 750 Words)
Asymmetric Key/Symmetric Key Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1451361-asymmetric-key-symmetric-key.
“Asymmetric Key/Symmetric Key Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1451361-asymmetric-key-symmetric-key.
  • Cited: 0 times

CHECK THESE SAMPLES OF Asymmetric Key/Symmetric Key

Encryption Exploitation Technologies

The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011).... In symmetric encryption, both the receiver and the sender of data or information have the same key or encryption key (Ackerman, 2008).... In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007)....
6 Pages (1500 words) Research Paper

Network and Internet Security

They can be of the following type: a shared secret; authenticated public keys; a single public key; one time passwords.... This technique ensures that there is only one key which will be used – that is a secret key.... Asymmetric encryption (Public key encryption) - requires the use of a two keys where one is a private key and the other is a public key which is known to a number of people.... Hybrid encryption (single key and public key) – this technique used both the symmetric and asymmetric encryption techniques....
6 Pages (1500 words) Essay

Reasons for the Strengthening of the Overall Corporate Governance System

As discussed above that uncertainty is one of the key elements which differentiate the labor markets, therefore, both internal as well as external factors heavily influence the decision making the process of making or buying.... Internal organizational factors such as agency relationships as well as adverse selection involve the management of the firms however; uncertainty and asymmetric information may be internal as well as external in nature....
6 Pages (1500 words) Term Paper

Asymmetric or Symmetric Key Encryption

This paper “Asymmetric or symmetric key Encryption” presents an overview of two encryption techniques.... hellip; The author states that symmetric key encryption is also known as a shared key or shared secret encryption.... Basically, in symmetric key encryption, both the data sender and receiver make use of the same key to both encrypt and decrypt data.... Some of the well-known examples of symmetric key encryption comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010)....
2 Pages (500 words) Case Study

Class student dicussions answers

I agree with you Jusin G that symmetric key distribution can pose to bring lots of insecure communication or message interception between the involved organizations.... The system allows the sender and receiver to share key which is common between them.... But I could rather suggest that since symmetric cryptography employs use of same key in both ends of the sender and receiver and… It is not best suited for two organizations which need a secure communication....
2 Pages (500 words) Assignment

Questions in Network Security

dvantages of combined a/symmetric cryptography over both cryptographies In symmetric key encryption (secret key encryption) method, data is scrambled by pressing same key to both decrypt and encrypt it while in asymmetric encryption (public key encryption), different keys are used to decrypt and encrypt.... In addition to this, asymmetric encryption allows sharing of key since decryption key is kept to oneself while with symmetric key encryption, the key have to be kept secret....
1 Pages (250 words) Coursework

Symmetric Encryption Algorithms

In addition, the identical “encryption key” is utilized for every data block.... SA asymmetric encryption is the most well-known asymmetric algorithm based on public key infrastructure, distinguished after its developer Adleman and Rivest, Shamir.... In addition, the encoding key employed for encryption is a kind of public key known to all as well as the key utilized for decoding the original message is the user's private key....
6 Pages (1500 words) Assignment

The Nature of Encryption Exploitation Technologies

The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able to access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011).... In symmetric encryption, both the receiver and the sender of data or information have the same key or encryption key (Ackerman, 2008).... In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007)....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us