Asymmetric or Symmetric Encryption Abstract In today's scenario it is vital to secure and maintain the confidentiality of information or data. It becomes all the more imperative when it is related to the research studies encompassing set of trials, studies, endurance, intellect and rigorous efforts taken to generate a meaningful research…
Download file to see previous pages...
Unprotected data could be accessed unscrupulously to fetch devastating consequences for any organization. Protection of data is mediated by various algorithms meant to encrypt the information (Symmetric and asymmetric cryptography overview). Asymmetric encryption or public key encryption involves two set of keys one is public key for encryption and another key for decryption, a private key. On the other hand symmetric encryption encompass a secret key that is applicable to encrypt plus to decrypt the information. It is a private single key common to both the receiver and the sender to decipher the information. It is essential that the key is kept covertly and sturdily and should be shared between two parties only. It gains convenience over asymmetric encryption process because of its ease and rapidity in operation but becomes cumbersome if the key is to be shared between more than two parties. Public key can be utilized by individuals as well as for business, where the trader seizes the private key and all the clients have access to the public key, as exploited by Lotus and Microsoft (Conventional versus Key Exchange Encryption).
...Download file to see next pagesRead More
Cite this document
(“Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1406548-asymmetric-or-symmetric-encryption
(Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 Words)
“Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1406548-asymmetric-or-symmetric-encryption.
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time.
Hashing algorithms are utilized to ensure data is not modified during transit – that is, to ensure data integrity. Lastly, signature based algorithms are used for authentication by providing a digital or electronic signature of the user. As an ABC institute of research has to protect highly sensitive information from its rivals, we will discuss symmetric and asymmetric encryption algorithms in this scenario.
As the author of the essay states, session keys are used to ensure that communication between two parties can be initiated when needed and terminated when there is no use of it. Besides, on of the main benefit of the session keys is that they limit the number of attacks on a system by making it difficult to attack a system.
Encryption is the conversion of data into a form called ciphertext. Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans (Mycrypto.net 2008).
However, as modern chemistry continues to discover catalytic systems which are organic, the popularity of cinchona alkaloids has become a famous catalyst as compared to other organic catalysts like (S)-proline (Groger, 2001) and simple peptides (Jarvo, 2000).
At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.