In: Computer Science
Try to make it as simple as you can and explain as much as it needed.
Ans:
Ans:
Ans:
Ans:
Ans:
Symmetric Key Encryption | Asymmetric Key Encryption |
---|---|
It only requires a single key for both encryption and decryption. | It requires two key one to encrypt and the other one to decrypt. |
The size of cipher text is same or smaller than the original plain text. | The size of cipher text is same or larger than the original plain text. |
The encryption process is very fast. | The encryption process is slow. |
It is used when a large amount of data is required to transfer. | It is used to transfer small amount of data. |
It only provides confidentiality. | It provides confidentiality, authenticity and non-repudiation. |
Examples: 3DES, AES, DES and RC4 | Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA |
In symmetric key encryption, resource utilization is low as compared to asymmetric key encryption. |
In asymmetric key encryption, resource utilization is high. |
2)
A set of values or elements that is statistically random, but it is derived from a known starting point and is typically repeated over and over. ... It is called "pseudo" random, because the algorithm can repeat the sequence, and the numbers are thus not entirely random.
3)
4)
one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.