Friday, May 3, 2019

Asymmetric or symmetric security key Case Study Example | Topics and Well Written Essays - 500 words

Asymmetric or symmetric security report - Case Study ExampleIn this scenario, both the sender and receiver decide for the shared spot before sending/receiving the data and indeed they can start encrypting and decrypting data between them by making use of that key. Some of the well cognise examples of symmetric key encoding comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010 Ezeobika, 2010). Fig1 demonstrates the process of Symmetric key encryptionIn addition, DES, 3DES, AES, and RC4 are some of the well known examples of symmetric encryption algorithm. In this scenario, 3DES and AES are wide utilized in IPsec and other types of VPNs (Stretch, 2010 KetuWare, 2004).Asymmetric encryption is also referred as public-key cryptography. As compared to the symmetric encryption method in asymmetric encryption two keys are utilize one for encryption and another(prenominal) for decryption. Basically, this encryption technique uses two keys fo r the data encryption a public key and a hole-and-corner(a) key. In this scenario, the public key is made available for all so it can be used to encrypt data and information by anyone who wants to send a message to the person who has the key. However, the private key is not disclosed to anyone and is employed to decrypt received data. Most commonly seen example of asymmetric key encryption is RSA (Stretch, 2010 Ezeobika, 2010). Fig2 demonstrates the process of Symmetric key encryptionExcellent Support for Message Authentication In view of the fact that the asymmetric encryption technique supports the digital signatures which allows the data receiver/sender to demonstrate that the data is actually received from a specific sender.Integrity of data As discussed above, the use of digital signatures also ensures the integrity of data. In addition, this technique allows the receiver to become aware of if the data was modified during infection because a digitally signed data cannot be a ltered without invalidating the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.