Question

In: Computer Science

Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by...

Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Cryptography is divided into two types: Symmetrical and Asymmetrical. Symmetrical cryptography uses a secret key to encrypt data and the same key to decrypt the ciphered data. Asymmetrical cryptography uses a public key to encrypt data and a public key to decrypt data. In this paper, you are going to compare symmetrical and Asymmetrical encryption using common algorithms from each encryption type. Your analysis should focus on speed, key length, and implementation.

Analysis

0 – 40 points

41 - 90

Demonstrates a lack of understanding of symmetrical and asymmetrical encryption

Demonstrates general understanding symmetrical and asymmetrical encryption

Writing Quality & Adherence to Format Guidelines

0-6 points

9-10 points

The paper shows a below average/poor writing style lacking in elements of appropriate standard English and following proper APA guidelines.

Paper is well written and clear using APA guidelines and standard English characterized by elements of a strong writing style.

Solutions

Expert Solution

Cryptography:

Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is studied can understand it and process it. Thus preventing unauthorized access to sensitive information. The prefix “crypt” means “hidden” and suffix "graphy" means “writing”.

In Cryptography the techniques which are use to protect information are acquired from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to safeguard confidential transactions such as credit card and debit card transactions.

Features Of Cryptography are as follows:

  1. Confidentiality
  2. Integrity
  3. Non-repudiation
  4. Authentication

Types Of Cryptography:

  1. Symmetric Key Cryptography
  2. Hash Functions
  3. Asymmetric Key Cryptography

Encryption is the process of disturbing data to make sure unintended recipients are not able to make any sense of the data. Two common encryption types are the symmetric and asymmetric encryption.

The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption process, and the asymmetric encryption uses public key for encryption and a private key for decryption process.

Let’s see each of these encryption methods separately to understand their differences better.

Symmetric encryption:

This is said to be the simplest and best known encryption technique. As discussed already, it uses one key for both encryption and decryption process.

  • Because the algorithm behind symmetric encryption is less difficult and executes faster, this is the better technique when transmitting data in bulk.
  • The plaintext is encrypted using a key, and the same key is used at the receiving end to decrypt the ciphertext at the receiver side. The host in the communication process would have received the key through external means.
  • Mostly used symmetric encryption algorithms include AES-128, AES-192, and AES-256.

Asymmetric encryption:

This type of encryption is rather new as compared to symmetric encryption, and is also referred to as public-key cryptography.

  • Asymmetric encryption is examined to be more secure than symmetric encryption as it uses two keys for the process.
  • The public key used for encryption is available to everyone but the private key is not published.
  • This encryption method is used in everyday communication over the internet.
  • When a message is encrypted using a public key, it can only be decrypted using a private key. However, when a message is encrypted using a private key, it can be decrypted using a public key.
  • Digital certificates in the client-server model can be used to discover public keys.
  • The drawback of this encryption is that it takes more time than the symmetric encryption process.
  • Common asymmetric encryption techniques include RSA, DSA, and PKCS.

Key differences:

Diffrence between common encryption algorithms in symmetric and asymmetric encryption:

Here the common algorithm in symmetric encryption is AES and in asymmetric encyption is RSA.

The only similarity both RSA and AES has is that they are encryption algorithms.

RSA :

1. It is an asymmetric key algorithm. Meaning, it uses 2 different keys (Public key and Private key) for encryption and decryption. Public key is available to open world, where as private key is possessed by owner.

  • Public Key encryption is used for exchanging data.
  • Privatr Key encryption is used for authentication of owner.(digital signatures)

2. It is stream cipher algorithm. Meaning, entire data is encrypted at once, which takes more computational power. Hence it is slow. Mainly used for exchanging little information such as symmetric keys.

3. RSA's strength and weaknesses lies in the factoring large integers.

AES :

1. It is a symmetric key algorithm. Meaning, same key is used for both encryption and decryption.

2. It is a 128-block cipher algorithm. Meaning, the data is divided into pieces of fixed length data(128 bits). The chunks are computed in AES where each round is dependent on output of its predecessor. Large data can be encrypted using AES.

3. AES's strength is in the possible key permutations using Rijndael finite field method internally.

References:

1. https://cyware.com/

2. https://www.geeksforgeeks.org/

3. https://www.quora.com/


Related Solutions

Directions Follow the Written Assignment Guidelines in this and all other assignments in this course. Below...
Directions Follow the Written Assignment Guidelines in this and all other assignments in this course. Below are the directions specific to this assignment. Jane Elliott created prejudice among the students in her elementary school classroom in one week. Watch the footage of her classic 1968 demonstration: A Class Divided (Links to an external site.)Links to an external site. The study starts at about 3:20 minutes into the episode and runs until about 17:50 if you want to be selective in...
Follow the instructions under Discussion Board Rubric and Discussion Guidelines and APA Tips to create your...
Follow the instructions under Discussion Board Rubric and Discussion Guidelines and APA Tips to create your post and respond to at least one other student. Answer 2 of the following question(s) and reply to at least one student's post. Internal citations and references are required. EMR/EHR are here to stay ~ let's take them to the next level! Electronic health records have been put into place, have been tweaked, and are currently a standard part of our healthcare system. The...
Writing assignments using an article recently published ( please provide the source cause it is the...
Writing assignments using an article recently published ( please provide the source cause it is the key of this assignment!! ). Your topic does not have to be restricted to accounting topics. The article MUST BE RESEARCHED USING THE INTERNET. Your Accounting article have to be from The CPA Journal, Journal of Accountancy or Accountant Today. The articles must be published in 2017 or 2018 and must contain at least 2 pages (equivalent to 8.5”x11”) of text. Each topic is...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question. The effective life of a component in an aircraft engine is modeled as a random variable with mean value 5000 hours and standard deviation 40 hours. The engine manufacturer introduced an improvement into the manufacturing process for this component that increases the mean life to 5050...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question. A team of medical researchers wants to estimate the malaria infection rate in a difficult-to-access jungle region of [No Name Country]. There are 80 villages in the studied part of the jungle, which can be assumed to be rather similar to each other. Each village has...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question. Consider a hypothesis test for the population mean value. A) Explain the concept of type I and type II errors, with error probabilities denoted by a and b. B) How do we decide whether to use one-sided or two-sided hypothesis tests? Give an example for both...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question. A team of medical researchers wants to estimate the malaria infection rate in a difficult-to-access jungle region of [No Name Country]. There are 80 villages in the studied part of the jungle, which can be assumed to be rather similar to each other. Each village has...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question. A team of medical researchers wants to estimate the malaria infection rate in a difficult-to-access jungle region of [No Name Country]. There are 80 villages in the studied part of the jungle, which can be assumed to be rather similar to each other. Each village has...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts of this question as they are all part and critical to answering this question correctly. Please show good integrity when answering the question: 1) A sample of cross-linked natural rubber (polyisoprene) is found to have a shear modulus of 500 kPa at 25˚C. Determine the force needed to stretch...
Please make sure to display your thought process? It is imperative to be able to follow...
Please make sure to display your thought process? It is imperative to be able to follow how the answer was deduced. Please be as thorough as possible. Please address all parts as they are critical to answering this question correctly: 1) Discuss the type of surface treatments that are applied to nanoclays in order to improve nanoclay dispersion in polymer matrices. What happens when untreated nanoclay is used to reinforce a polymer? What happens when a properly organically modified clay...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT