Free Essay

Symmetric and Asymmetric

In:

Submitted By lpaz120
Words 628
Pages 3
symmetric and asymmetric

symmetric and asymmetric



ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost. At ABC Institute, the researchers are unsure about the type of key (asymmetric or symmetric) to use. Please formulate a possible solution, and describe the advantages and disadvantages of any solution employed.

According to my research symmetric and asymmetric have pros and cons which are the following:

Symmetric key encryption is also known as secret key and private key. However in this type of encryption the sender and receiver share the same key, which is used to encrypt and decrypt messages. According to my research the sender and receiver have to specify the key in the beginning and then they can start encrypting or decrypting using the same key. Some advantages are that encryption is easy to carry out. However users have to share the secret key and then begin to encrypt and decrypt messages. Another big plus is that when you need to encrypt or decrypt your own files on a message or files, there is no need to create different keys. We have to remember that symmetric key encryption is faster than asymmetric key encryption. The reason because is faster is because single key encryption does not require a lot of computer memory compared to a public key encryption. If the key is compromised, only the messages between a particular pair of sender and receiver will be affected. Some disadvantage is the need for secure channel for secret key exchange. Another issue is that when you need to communicate with every different party you need to create a key. This creates a problem with managing and ensuring the security of all these keys. Since the key same key is used by every body you cannot verify is the user that make changes. This may be a problem if there is a dispute.

Meanwhile Asymmetric Also known as public key. This method need two keys which are a public key and a private key. The public key is used to encrypt a message by anyone wants to send a message to the person that the key belongs to. The private key is kept secret and is used to decrypt received messages. Some advantages of this method are that it solves the problem of sharing one the key for. Everyone public keys and private keys are kept secret. Public key encryption allows digital signatures to enables the recipient of a message. This helps know if the message is truly from a particular sender. A digital signature in public key encryption helps us detect if the message was altered. A big plus is that digitally signed message cannot be alerted without invalidating the signature. Unfortunately there are some disadvantages. For example, No one can be one hundred percent sure that a public key is from that person so everyone must verify that their public keys belong to them. A big disadvantage is that public key encryption is really slow compared to symmetric encryption. Is not very efficient on decrypting bulk messages. Also it requires a lot of memory compared to single-key encryption. If a hacker cracks a person's private key, his entire messages can be read.

In conclusion I will recommend Symmetric key encryption. The reason I choose symmetric key is because when you need to encrypt or decrypt your own files on a message or files, there is no need to create different keys. Symmetric key encryption is faster than asymmetric key encryption. Also you only create one key so without that key you cant do anything and is very useful for top secret information.

Similar Documents

Premium Essay

Cryptography

...Symmetric Cryptography Secret writings have been found in many civilizations dating back to thousands of years where wide spread writings were adopted. Some of these civilizations included the Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and decrypt the ciphertext. With a more contemporary look at symmetric key encryption with computer data, we can classify it into two categories called block ciphers and stream ciphers. The data in a block cipher would be broken down into specific sizes, for example 64-bit blocks or 128-bit blocks, which then the blocks would be encrypted separately. In stream ciphers, data would be encrypted in a stream of bits as oppose to dividing the data into blocks of bits. The decryption process for these two classification of symmetric encryption, of course, would be to use the same encryption key. Differences and Similarities with Symmetric and Asymmetric The fundamental difference between symmetric and asymmetric cryptography would be that asymmetric uses two keys, a public and private key, for encryption and decryption. If a private key is used to encrypt, then a related public key would be used to decrypt. This could also work the other way around when a public key is used to encrypt, then a related private key would be used to decrypt. Unlike...

Words: 558 - Pages: 3

Premium Essay

Nt1330 Unit 1 Assignment

...certificates, asymmetric keys, and symmetric keys. Asymmetric keys and symmetric keys can be stored outside of SQL Server in an Extensible Key Management (EKM) module. The following illustration shows that each layer of the encryption hierarchy encrypts the layer beneath it, and displays the most en configurations. The access to the start of the hierarchy is usually protected by a password. Symmetric encryption policy: - There are several ways to include hidden content in a message. In the beginning of cryptology, using invisible ink was a common method. That style of actually hiding is still in use today and called steganography. However, the term encryption today usually refers to the use of an algorithm that is transforming a readable message into an unreadable...

Words: 656 - Pages: 3

Free Essay

Computer Security

...in order to decode or read the encrypted message or information and secret code called the key. Sometimes it will be impractical while sending large amounts of data over the World Wide Web. In symmetric key cryptography, both the parties for encryption and decryption share the same key. When using symmetric key, both the parties must keep the key secret at any cost. This type of encryption is usually used in offline methods. As the information at ABC institute is very sensitive, they cannot go for symmetric key if sensitive information will be sent through the World Wide Web. In order encrypt data and send it securely, Asymmetric is the stronger in security of the two. Asymmetric features key public key is shared to every one and each party or individual will have their own private key to decrypt the message and can be safe and cannot be read by others. Since it eliminates the need of sharing your secret key with another party, it provides a more secure platform than the symmetric option, which requires that the decryption key be given to the recipient. The disadvantage of asymmetric key cryptography is it is very slow when compared to the symmetric key. Asymmetric is more demanding because it needs more processing for the encryption and decryption to work properly. In symmetric key cryptography, both the parties for encryption and decryption share the same key, which already saves you a step making it faster...

Words: 475 - Pages: 2

Free Essay

Symmetric Key Encryption

...Symmetric key encryption is also known as shared-key, single-key, secret-key, and private-key or one-key encryption. In this type of message encryption, both sender and receiver share the same key which is used to both encrypt and decrypt messages. Sender and receiver only have to specify the shared key in the beginning and then they can begin to encrypt and decrypt messages between them using that key. Examples include AES (Advanced Encryption Standard) and TripleDES (Data Encryption Standard). Advantages - Simple: This type of encryption is easy to carry out. All users have to do is specify and share the secret key and then begin to encrypt and decrypt messages. - Encrypt and decrypt your own files: If you use encryption for messages or files which you alone intend to access, there is no need to create different keys. Single-key encryption is best for this. - Fast: Symmetric key encryption is much faster than asymmetric key encryption. - Uses less computer resources: Single-key encryption does not require a lot of computer resources when compared to public key encryption. Disadvantages - Need for secure channel for secret key exchange: Sharing the secret key in the beginning is a problem in symmetric key encryption. It has to be exchanged in a way that ensures it remains secret. - Too many keys: A new shared key has to be generated for communication with every different party. This creates a problem with managing and ensuring the security of all these keys. - Origin...

Words: 729 - Pages: 3

Premium Essay

Csec 630 Lab 1

...Lab Assignment #1: Introduction to Encryption Algorithms CSEC 630 University of Maryland University College Professor Jingyu Zhang 1. Which tool or technique would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The best analysis tool to break the Caesar cipher is histogram because it performs a statistical analysis on cipher text which shows the frequency of each letter used in the file. This can later be compared and matched to the frequency of letters in the English language. 2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case? Histogram simply gives the frequency of each individual letter in cipher text without taking the plaintext into consideration. Since in Caesar cipher the relationship between plaintext and cipher text is one to one, histogram is more efficient to break the cipher. Since the key in vigenere is somewhat random the histogram shown below seems random as well. 3. There is an error in the following cipher text representation of this quote, what is it? The original unencrypted message is: TH ED IF FE RE NC EB ET WE EN ST UP ID IT YA ND GE NI US IS TH AT GE NI US HA SI TS LI MI TS The original encrypted message is: THE CORRECT CIPHERTEXT SD AH FO HL AR ST RE AS YL BS CI MQ TF NI VE TG HB SN QC NC SD TD HB SN QC DE CN IC IF OT IC This is the error example: SD...

Words: 1083 - Pages: 5

Free Essay

Network

...Network Assignment #2 1. Compare Peer-to-Peer against Client server Networks. Discuss (briefly) the differences using the following factors: a. Security: Peer-to-Peer does not provide the security available on a client/server network but a client/server has its resources centralized which mean resources and data security are controlled through the server. b. Complexity: Peer-to-Peer only required two computers connected together however client/server required special software to communicate between server and client. c. Operating Systems requirements: Peer-to-Peer required an operating system such as Windows XP or Appleshare to establish a network communication, however for client/server special software such as Novell Netware or Windows 2000 server must be installed on the client and server devices. d. Scalability: Peer-to-Peer e. Redundancy / backup: 2. Define the following: a. Router: is a device that connects two networks - frequently over large distances. b. Hub: is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network. c. Switch: is a small hardware device that joins multiple computers together within one LAN. Technically, network switches operate at layer two Data Link Layer of the OSI Model. d. Gateway: A device that acts as a go-between two or more networks that use the same...

Words: 669 - Pages: 3

Free Essay

Week 6 Conference

...What is asymmetric encryption and why do we need it? Asymmetric encryption is also known as public key encryption where there are two keys, a public key and a private key (Ezeobika, 2010). One key is used to encrypt and the other to decrypt (Hitachi ID Systems, Inc., 2013). Asymmetric encryption allows users to send secret messages by encrypting with the public key that belongs to the recipient (Hitachi ID Systems, Inc., 2013). Only the recipient will be able to decrypt the message because only that person will have access to the required key (Hitachi ID Systems, Inc., 2013). A somewhat similar way to view this is the locking and unlocking of a safety deposit box at the bank. The bank has the “public” key that is used as one of the necessary keys to open and close the box. In this situation “public” refers to the same key used for other safety deposit boxes within the bank. While the renter has the private key that is also necessary to open and close the box. Asymmetric encryption is useful because it allows for digital signatures which allow the person who is receiving a message to verify that a message is truly from a particular sender and to detect if the message has been altered (Ezeobika, 2010). Lastly, asymmetric encryption allows for accountability because once a message has been digitally signed the sender cannot deny having sent it (Ezeobika, 2010). Agrawal, M., & Mishra, P. (2012, May). A comparitive survey on symmetric key encryption techniques. International...

Words: 399 - Pages: 2

Premium Essay

Sandwich Blitz Unit 7 Checkpoint

...The first type of encryption is hashing. Hashing has a fixed-length signature for a message or information set. Every hash has a particular message, so any changes on that message would make it so simple to be tracked. Once information is encrypted using hashing method, it cannot be reversed or deciphered. The second type of encryption is symmetric. Symmetric encryption also known as symmetric key or private-key cryptography, and the reason of calling it a symmetric key because the same key used to encrypt and decrypt the data. For instance, if you encrypted a message on a CD and send it to another party, the key must also be sent to the second party so that he/ she...

Words: 734 - Pages: 3

Free Essay

Cryptography Outline

...presentation discusses and demonstrates the key concepts of Cryptography from attacks, PKIs and Encryption in detail. You’ll learn about the difference between public and private keys and about the similarities and differences between symmetry & asymmetry. We’ll also discuss the concept of integrity and confidentiality and their relationships to/with protocols. This Cryptography course will help you master the basics of Cryptography as you begin to develop the discipline needed to become an accomplished pen tester. Keys and Principles 1. Keys 1a. Symmetric - also referred to as same keys, private key, symmetric key - same (confidentially) Different Version/Ways/Procedures to get PlainText to CipherText Symmetric Cipher Examples: AES, DES, 3DES, IDEA, CAST, twofish, Blowfish, RC2, Serpent, Rijndael - (there are others, chart at end of section) PGP, OTP (One Time password) Mnemonic device to remember some Symmetric Ciphers (how it reads, sounds and then corresponds, in English): Hey! These 3 guys, had an idea to cast...

Words: 3749 - Pages: 15

Premium Essay

Case Study Week 3

...transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might wish to share encrypted data. The public key is used to encrypt the data being sent, while the private key (kept secret) is used to decrypt said data. The public key is not at as much risk because only the private key can unlock it. Asymmetric encryption, however, utilizes a lot of computing...

Words: 451 - Pages: 2

Premium Essay

Computer Science

...ICT-457 Network Security Sum-2013 HW-9 1. Provide the name of a link to 2 publicly available encryption software tools. http://export.stanford.edu/encrypt_ear.html https://www.cryptanium.com/?gclid=CLbz5Z7KlbgCFcU5QgodrC0APg 2. Explain the difference between symmetric and asymmetric key cryptography. Provide an example where each is used. Pg. 282/283. Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers. Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers. Symmetric key cryptography cannot secure correspondence until after the two parties exchange keys. Asymmetric key cryptography uses a cipher with two separate keys. One is for encryption and one for decryption. Correspondents do not first have to exchange secret information to communicate securely. With asymmetric key cryptography, an opponent can intercept everything and still not be able to decipher the message. 3. Explain why having an entity’s public key alone does not allow someone to decrypt a message. Pg. 288. Because it is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 4. Does a hash function ensure integrity or privacy? Explain your answer. Pg.309/310. Hash functions help to detect forgeries. They compute a checksum of a message and then combine it with a cryptographic function so that the result...

Words: 363 - Pages: 2

Premium Essay

Nt1330 Unit 7 Cypg 3kb

...This is only a prototype and if this data was sent through the internet this would insure that a hacker couldn’t read the message. The disadvantage is it will need more space to store in the database and it will be a bit slower when you sending it to the database. When choosing the right cryptography, we are faced with a tough decision due to the fact we have so many different choices. Let’s start by looking at two main groups of cryptography: symmetric and asymmetric encryption. For this propose it is easy to decide which of those two we will be using because the application will be communicating with a local database and there will be no need to verify the identity to make a connection and the database will not be required to decrypt this data therefore only one key will be required which will be held by the application. We will be going with symmetric which only needs one key and it is much faster in encrypting/decrypting in comparison to asymmetric encryption. This key will encrypt the password so that if someone has a look in a database he will not be able to read the...

Words: 527 - Pages: 3

Free Essay

Ethical Hacking Chapter 3

...* Question 1 5 out of 5 points | | | Symmetric encryption faces difficulty due to what issue? | | | | | Selected Answer: | Key exchange | Answers: | Security | | Key exchange | | Bit length | | Software expense | | | | | * Question 2 5 out of 5 points | | | Digital signatures are used for all but which one of the following purposes? | | | | | Selected Answer: | Availability | Answers: | Authentication | | Nonrepudiation | | Integrity | | Availability | | | | | * Question 3 5 out of 5 points | | | Which of the following is most likely to be broken using a birthday attack? | | | | | Selected Answer: | MD5 | Answers: | DES | | RSA | | PKI | | MD5 | | | | | * Question 4 0 out of 5 points | | | Attacks against ciphers that feed information into a system and observe output are: | | | | | Selected Answer: | Known plaintext | Answers: | Ciphertext only | | Known plaintext | | Chosen plaintext | | Chosen ciphertext | | | | | * Question 5 5 out of 5 points | | | Asymmetric encryption does not require ___________. | | | | | Selected Answer: | secure initial key exchange | Answers: | key exchange | | secret keys | | multiple keys | | secure initial key exchange | | | | | * Question 6 5 out of 5 points | | | Symmetric encryption requires which of the following? | | | | | Selected Answer: | Both the parties...

Words: 676 - Pages: 3

Premium Essay

Introduction and Mechanics of Encryption

...before being sent over the Internet. Symmetric Encryption Symmetric method: same key used for encryption and decryption. Advantage: Much faster than asymmetric encryption Disadvantage: 1. Both sender and receiver need to know the shared secret key. 2. A separate secret key needs to be created for use by each party with whom the use of encryption is desired. eg. If company A wants to encrypt information it shares with companies B and C, but prevent B and C from having access to the other’s information, it needs to create two encryption keys, one for use with company B and the other for use with company C. Otherwise, if company A shared only one common secret key with them, either company could decrypt any information to which it obtained access. Asymmetric Encryption Asymmetric method: different keys used for encryption and decryption. One key, called the public key, is widely distributed and available to everyone; the other, called the private key, is kept secret and known only to the owner of that pair of keys. Advantages: 1. No sharing of key necessary. It does not matter who knows the public key, because any text encrypted with it can be decrypted only by using the corresponding private key. 2. More secure than symmetric systems Disadvantage: Much slower than symmetric systems In summary, e-business uses both types of encryption systems. Symmetric encryption is used to encode most of the data being exchanged, and asymmetric encryption is used...

Words: 689 - Pages: 3

Free Essay

Intro to Pki

...A PKI allows client and server applications to gain trust in each other's authentication credentials in a highly scalable and efficient manner. Applications can then employ those credentials to perform strong authentication and make use of end-to-end confidentiality and integrity services. To show where a PKI might prove useful, let's look at the case study of a company called Exploration Air that wants its customers to have access to an internal Web server. Exploration Air expects a number of users in each customer organization to securely log on to the Web server. The challenge lies in managing authentication credentials for all those external users. If Exploration Air uses passwords, their IT department is expected to somehow identify those users, as well as process password changes for them. This solution does not scale well, and for a large number of users it becomes unmanageable. Attackers can also guess passwords, and passwords might not offer strong enough authentication for high-value transactions. With a PKI, Exploration Air can delegate the issuing of authentication credentials to certification authorities run by the customers themselves, or to a commercial certification authority. This way, the company needs to configure its Web server only to trust those authorities. Those credentials also offer strong authentication because they cannot be guessed. Now let's say that Exploration Air wants to exchange secure e-mail with users of the same customers. A password...

Words: 6278 - Pages: 26