In: Computer Science
Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Cryptography is divided into two types: Symmetrical and Asymmetrical. Symmetrical cryptography uses a secret key to encrypt data and the same key to decrypt the ciphered data. Asymmetrical cryptography uses a public key to encrypt data and a public key to decrypt data. In this paper, you are going to compare symmetrical and Asymmetrical encryption using common algorithms from each encryption type. Your analysis should focus on speed, key length, and implementation.
Analysis |
0 – 40 points |
41 - 90 |
|
Demonstrates a lack of understanding of symmetrical and asymmetrical encryption |
Demonstrates general understanding symmetrical and asymmetrical encryption |
||
Writing Quality & Adherence to Format Guidelines |
0-6 points |
9-10 points |
|
The paper shows a below average/poor writing style lacking in elements of appropriate standard English and following proper APA guidelines. |
Paper is well written and clear using APA guidelines and standard English characterized by elements of a strong writing style. |
Cryptography:
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is studied can understand it and process it. Thus preventing unauthorized access to sensitive information. The prefix “crypt” means “hidden” and suffix "graphy" means “writing”.
In Cryptography the techniques which are use to protect information are acquired from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to safeguard confidential transactions such as credit card and debit card transactions.
Features Of Cryptography are as follows:
Types Of Cryptography:
Encryption is the process of disturbing data to make sure unintended recipients are not able to make any sense of the data. Two common encryption types are the symmetric and asymmetric encryption.
The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption process, and the asymmetric encryption uses public key for encryption and a private key for decryption process.
Let’s see each of these encryption methods separately to understand their differences better.
Symmetric encryption:
This is said to be the simplest and best known encryption technique. As discussed already, it uses one key for both encryption and decryption process.
Asymmetric encryption:
This type of encryption is rather new as compared to symmetric encryption, and is also referred to as public-key cryptography.
Key differences:
Diffrence between common encryption algorithms in symmetric and asymmetric encryption:
Here the common algorithm in symmetric encryption is AES and in asymmetric encyption is RSA.
The only similarity both RSA and AES has is that they are encryption algorithms.
RSA :
1. It is an asymmetric key algorithm. Meaning, it uses 2 different keys (Public key and Private key) for encryption and decryption. Public key is available to open world, where as private key is possessed by owner.
2. It is stream cipher algorithm. Meaning, entire data is encrypted at once, which takes more computational power. Hence it is slow. Mainly used for exchanging little information such as symmetric keys.
3. RSA's strength and weaknesses lies in the factoring large integers.
AES :
1. It is a symmetric key algorithm. Meaning, same key is used for both encryption and decryption.
2. It is a 128-block cipher algorithm. Meaning, the data is divided into pieces of fixed length data(128 bits). The chunks are computed in AES where each round is dependent on output of its predecessor. Large data can be encrypted using AES.
3. AES's strength is in the possible key permutations using Rijndael finite field method internally.
References:
1. https://cyware.com/
2. https://www.geeksforgeeks.org/
3. https://www.quora.com/