Evaluation Of Asymmetric Encryption And Symmetric Encryption Technology

PAGES
4
WORDS
1214
Cite

¶ … Symmetric Encryption and Asymmetric Encryption Technology On the VM (virtual machine) in the university virtual lab, there consists a folder named "c:encrypt." The folder consists of two files:

img.jpg, and "encrypt.exe -- encrypt and decrypt key."

This paper decrypts the picture to view the text hidden in the picture.

Objective of this project is to discuss the encryption technology strategy used for the software application.

Encryption Technology Strategy used for the Software Application

In the IT (information technology) environment, the symmetric encryption and asymmetric encryption technology are used to encrypt and decrypt a text or message. However, the asymmetric is the encryption technology used to encrypt the text inside the img.jpg file. The asymmetric encryption uses the two keys for the asymmetric cipher, and the two keys consist of a private and public key. In essence, the public key is available for everybody where the private key is only known to the owner. In the case of img.jpg, the file is encrypted with public key, however, the private key is known only known to the owner. One of the benefits of the asymmetric cipher is that it is able to solve the problem of secure key distribution, which is one of the problems of symmetric encryption. (Delfs, & Knebl 2007).

The case of asymmetric encryption is different, anybody can use the public key to encrypt the text, however, only the owner of the file can use the private key to decrypt the text. In the case of img.jpg file, the file is encrypted with the public key because when a user runs the encrypt.exe on the file, the encrypted text will come out. The asymmetric chipper is able to solve the problem associated to scalability since everyone will require one private key and one public...

...

(Katz, & Lindell, 2007). However, asymmetric encryption is quite slow compared symmetric ciphers.
The paper also discusses the symmetric encryption to enhance a greater understanding the difference between symmetric encryption and asymmetric encryption. The symmetric encryption uses the same symmetric key to encrypt and decrypt a text. For example, two individuals want to keep a message a secret. The first person will use a key to encrypt the message. In essence, the original message is referred as plaintext while the encrypted text is referred as ciphertext. If the first person sends the cipher text to the second person, the same symmetric cipher will be used decrypt the text. The most widely used symmetric algorithm is the symmetric key cryptography, which is known as Advanced Encryption Standard (AES). The AES are three block ciphers that comprises of AES-192, AES-128, and AES-256. Each of the cipher is sufficient enough to protect a classified information. (Katz, & Lindell, 2007).

Major benefit of symmetric key is that it is possible to change the key every time two individuals exchange the key. For example, a key can be randomly generated in one session and if an attacker is able to get hold of the key, the attacker will only be able decrypt message for one session. However, if an attacker gets hold of the same key used for all sessions, the attacker will be able to decrypt all the message.

Major shortcoming of symmetric key is that all parties have to exchange the key in order to encrypt the text and decrypt the same text. The requirement makes symmetric key to face challenges in enhancing a secured key distribution. In the symmetric key, the key space is doubled when a bit is added to the cypher key. However, a longer bit can make symmetric…

Sources Used in Documents:

Reference

Delfs, H. & Knebl, H. (2007). Symmetric-key encryption. Introduction to cryptography: principles and applications. Springer.

Katz, J. & Lindell, Y. (2007). Introduction to Modern Cryptography. CRC Press.


Cite this Document:

"Evaluation Of Asymmetric Encryption And Symmetric Encryption Technology" (2015, October 15) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/evaluation-of-asymmetric-encryption-and-2155689

"Evaluation Of Asymmetric Encryption And Symmetric Encryption Technology" 15 October 2015. Web.16 April. 2024. <
https://www.paperdue.com/essay/evaluation-of-asymmetric-encryption-and-2155689>

"Evaluation Of Asymmetric Encryption And Symmetric Encryption Technology", 15 October 2015, Accessed.16 April. 2024,
https://www.paperdue.com/essay/evaluation-of-asymmetric-encryption-and-2155689

Related Documents

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Much work remains to enable a seamless Integration, for example that can extend IP to support mobile network devices. (Chlamtac, Conti, and Liu, 2003) 4G is stated to begin with the assumption "that future networks will be entirely packet-switched, using protocols evolved from those in use in today's Internet." (Chlamtac, Conti, and Liu, 2003) It is reported that a 4G wireless network that is all IP-based "has intrinsic advantages over its