StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Asymmetric or Symmetric Encryption - Essay Example

Cite this document
Summary
Asymmetric or Symmetric Encryption Abstract In today's scenario it is vital to secure and maintain the confidentiality of information or data. It becomes all the more imperative when it is related to the research studies encompassing set of trials, studies, endurance, intellect and rigorous efforts taken to generate a meaningful research…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Asymmetric or Symmetric Encryption
Read Text Preview

Extract of sample "Asymmetric or Symmetric Encryption"

Asymmetric or Symmetric Encryption In today's scenario it is vital to secure and maintain the confidentiality of information or data. It becomes all the more imperative when it is related to the research studies encompassing set of trials, studies, endurance, intellect and rigorous efforts taken to generate a meaningful research. The methods available to encrypt data involves asymmetric and symmetric means. The present article emphasizes upon the benefits of these methods for data protection. Introduction Encryption of data is necessary in transmitting information through electronic means, to safeguard- data or information, sensitive documents and private communications made through internet, else the information could be distorted, filched, or misrepresented.

Unprotected data could be accessed unscrupulously to fetch devastating consequences for any organization. Protection of data is mediated by various algorithms meant to encrypt the information (Symmetric and asymmetric cryptography overview). Asymmetric encryption or public key encryption involves two set of keys one is public key for encryption and another key for decryption, a private key. On the other hand symmetric encryption encompass a secret key that is applicable to encrypt plus to decrypt the information.

It is a private single key common to both the receiver and the sender to decipher the information. It is essential that the key is kept covertly and sturdily and should be shared between two parties only. It gains convenience over asymmetric encryption process because of its ease and rapidity in operation but becomes cumbersome if the key is to be shared between more than two parties. Public key can be utilized by individuals as well as for business, where the trader seizes the private key and all the clients have access to the public key, as exploited by Lotus and Microsoft (Conventional versus Key Exchange Encryption).

Keys can be wrecked by means of: (1) Simple guess work for the password or key. (2) By means of interception where access to communication could be made or access to computer could be accomplished. (3) By means of Brute force where computer knowledge is exploited to decipher the key (Conventional versus Key Exchange Encryption). Symmetric encryption method is more vulnerable to all three above mentioned methods but asymmetric method is vulnerable to third one only. Symmetric method sounds weak method but it possess ease in its operation whereas asymmetric is complicated process and requires decrypting software in many cases.

However, if smallest amount of care and protection is taken then symmetric method is more handy and protected (Conventional versus Key Exchange Encryption). Conclusion In the present case only two organizations namely ABC and XYZ are involved to share same set of information and therefore symmetric encryption method is best to encrypt genetic research findings and records. Symmetric encryption is summarized as: Correspondent> Encryption with key >Receiver >Decryption with key Asymmetric encryption is summarized as: Correspondent> Encryption with Receiver's Public key >Receiver >Decryption with receiver's private key (Conventional versus Key Exchange Encryption).

Since the encryption requires lot of programming in asymmetric encryption process, it is a time consuming process moreover it requires expertise to decrypt the information. A researcher working in the field of genetics need to be more focused on the research rather than the tiresome procedures of encrypting the data, one must adopt symmetric means of data encryption process. Reference Conventional versus Key Exchange Encryption. Available at http://www.centurionsoft.com/centurionmail/wpencryption.html. [Accessed on 28th January 2011].

Symmetric and asymmetric cryptography overview. Available at http://www.netlab.tkk.fi/opetus/s38153/k2003/Lectures/g33symm_asymm_crypto.pdf. [Accessed on 29th January 2011]

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1406548-asymmetric-or-symmetric-encryption
(Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1406548-asymmetric-or-symmetric-encryption.
“Asymmetric or Symmetric Encryption Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1406548-asymmetric-or-symmetric-encryption.
  • Cited: 1 times

CHECK THESE SAMPLES OF Asymmetric or Symmetric Encryption

Encryption Exploitation Technologies

symmetric encryption symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies.... In symmetric encryption, both the receiver and the sender of data or information have the same key or encryption key (Ackerman, 2008).... In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007)....
6 Pages (1500 words) Research Paper

Importance of Internet Security

Internet Security Name: Course: Tutor: Date: SECTION A 1.... This question is concerned with basic terminology in computer security.... (a) What are the main goals in computer security?... For each goal, give a brief description and an example.... The main goals of computer security are Confidentiality- entails verification of information's privacy....
17 Pages (4250 words) Coursework

Asymmetric or Symmetric Key Encryption

This paper “asymmetric or symmetric Key Encryption” presents an overview of two encryption techniques.... Fig1 demonstrates the process of Symmetric-key encryption:Figure 1Process of symmetric encryption, Image Source: (Stretch, 2010)In addition, DES, 3DES, AES, and RC4 are some of the well-known examples of the symmetric encryption algorithm.... As compared to the symmetric encryption method in asymmetric encryption two keys are used: one for encryption and another for decryption....
2 Pages (500 words) Case Study

Class student dicussions answers

I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of passing data across a wireless network than WEP.... Good analysis of the encryption for wireless networks you Pavitor.... disagree with you Jusin G concerning WEP encryption.... It is true that the encryption is less secure as compared to its predecessor, WPA and WPA2, but we should be grateful of its creation since it is the basis of the encryptions technologies which followed....
2 Pages (500 words) Assignment

Questions in Network Security

In combined a/symmetric encryption, a random symmetric key is created to encrypt the data then the key is encrypted asymmetrically.... symmetric encryption helps in preventing creation of point attack while trying to improve feasibility of encrypted information through use of clearinghouse in symmetric encryption involving a large number of people.... he combines of the two methods takes the advantage of the speed of symmetric encryption with the convenience of asymmetric encryption....
1 Pages (250 words) Coursework

Cryptography as One Fundamental Way of Saving Communications: Information and Data Security Technology

Symmetric cryptography/encryptions algorithms utilize the similar key for encryption until they are used for decryption.... In this type of encryption, the encryption key is loosely linked to the decryption key.... Asymmetric cryptography utilizes diverse encryption keys intended for decryption and encryption.... These encryption keys are known or labeled as a private and a public key.... The second type of encryption is asymmetrical cryptography technique which has been verified to be safe against computationally limited hackers....
18 Pages (4500 words) Research Paper

Symmetric Encryption Algorithms

This assignment "symmetric encryption Algorithms" discusses Stream Ciphers as asymmetric encryption algorithm that encrypts the bits of data and information.... On the other hand, Block Ciphers symmetric encryption algorithms is a way of data and information encryption that breaks down data and information into blocks and perform encryption or encoding on the data in every block.... Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time....
6 Pages (1500 words) Assignment

The Nature of Encryption Exploitation Technologies

nbsp; symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies.... In symmetric encryption, both the receiver and the sender of data or information have the same key or encryption key (Ackerman, 2008).... In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007).... The encryption key in the symmetric encryption method is applied both when encrypting and decrypting data....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us