Question

In: Computer Science

1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ?...

1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ?
2) when is a PKI requierd ?

Solutions

Expert Solution

1) Encryption algorithms are often divided into two categories, known as symmetric and asymmetric encryption. The fundamental difference between these two methods of encryption relies on the fact that symmetric encryption algorithms make use of a single key, while asymmetric encryption makes use of two different but related keys. The symmetric encryption is used for bulk data transmission whereas asymmetric encryption is often used for securely exchanging secret keys.Algorithms use by symmetric encryption are DES, 3DES, AES, and RC4.and algorithms use by asymmetric encryption are Diffie-Hellman, RSA.

2)

PKI(public key infrastructure) is the technology that allows you to encrypt data, digitally sign documents, and authenticate yourself using certificates.

PKI ( public key infrastructure) which is the technology behind digital certificates. A digital certificate fulfills a similar purpose to a driver’s license or a passport – it is a piece of identification that proves your identity and provides certain allowances. A digital certificate allows its owner to encrypt, sign, and authenticate.


Related Solutions

1. What is the relationship between public key cryptographic algorithms and numbers theory? Please give an...
1. What is the relationship between public key cryptographic algorithms and numbers theory? Please give an example 2. What are the different concepts and theorems that number theory encompasses? 3. What are the different engineering applications that make use of number theory?
Please explain the key differences between RRT* (RRT-star) and A* (A-star) algorithms.
Please explain the key differences between RRT* (RRT-star) and A* (A-star) algorithms.
What is the difference between symmetric competition and asymmetric competition? How would you expect species to...
What is the difference between symmetric competition and asymmetric competition? How would you expect species to react, adapt and evolve in response to each type of competition?
Explain the main differences between grammars in problems 1, 2 and 3. 1. Expr -> Expr...
Explain the main differences between grammars in problems 1, 2 and 3. 1. Expr -> Expr + Term I Expr * Term I Term     Term-> 0 I ... I 9 I (Expr) 2. Expr -> Term+ Expr I Term * Expr I Term     Term -> 0 I …. 9 I (Expr) 3. Expr -> Expr + Term I Term Term-> Term* Factor I Factor    Factor-> 0 I ... I 9 I (Expr)
Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it...
Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it is applied to generate and validate the MAC. b) Describe any additional information is needed by the receiver to validate the MAC. c) Explain whether the receiver can trust a successfully validated MAC and any assumptions about the additional information you identified in (b) for a validated MAC to be trusted.
Explain the main differences between OSHA PELs and ACGIH TLVs.
Explain the main differences between OSHA PELs and ACGIH TLVs.
What is asymmetric view? Explain the relationship(if any) between the EMH, the asymmetric view, and the...
What is asymmetric view? Explain the relationship(if any) between the EMH, the asymmetric view, and the CAPM.
Question 1 (a) Explain the main differences between equity and efficiency. [10 marks] (b) Outline the...
Question 1 (a) Explain the main differences between equity and efficiency. [10 marks] (b) Outline the opportunity costs that an adult learner faces. [10 marks] (c) Explain the issues that are normally discussed in microeconomics.
13. Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how...
13. Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it is applied to generate and validate the MAC. b) Describe any additional information is needed by the receiver to validate the MAC. c) Explain whether the receiver can trust a successfully validated MAC and any assumptions about the additional information you identified in (b) for a validated MAC to be trusted.
Explain the main aspects that characterize public sector entities and discuss the main differences between private...
Explain the main aspects that characterize public sector entities and discuss the main differences between private and public sector accounting.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT