¶ … Symmetric Encryption and Asymmetric Encryption Technology On the VM (virtual machine) in the university virtual lab, there consists a folder named "c:encrypt." The folder consists of two files: img.jpg, and "encrypt.exe -- encrypt and decrypt key." This paper decrypts the picture to view the text hidden in the picture....
The evaluation essay is one of the more common types of advanced academic writing. While a basic research paper or essay asks a student to gather and present information, the evaluation essay goes a step further by asking students to draw conclusions from the information they have...
¶ … Symmetric Encryption and Asymmetric Encryption Technology On the VM (virtual machine) in the university virtual lab, there consists a folder named "c:encrypt." The folder consists of two files: img.jpg, and "encrypt.exe -- encrypt and decrypt key." This paper decrypts the picture to view the text hidden in the picture. Objective of this project is to discuss the encryption technology strategy used for the software application.
Encryption Technology Strategy used for the Software Application In the IT (information technology) environment, the symmetric encryption and asymmetric encryption technology are used to encrypt and decrypt a text or message. However, the asymmetric is the encryption technology used to encrypt the text inside the img.jpg file. The asymmetric encryption uses the two keys for the asymmetric cipher, and the two keys consist of a private and public key. In essence, the public key is available for everybody where the private key is only known to the owner.
In the case of img.jpg, the file is encrypted with public key, however, the private key is known only known to the owner. One of the benefits of the asymmetric cipher is that it is able to solve the problem of secure key distribution, which is one of the problems of symmetric encryption. (Delfs, & Knebl 2007). The case of asymmetric encryption is different, anybody can use the public key to encrypt the text, however, only the owner of the file can use the private key to decrypt the text.
In the case of img.jpg file, the file is encrypted with the public key because when a user runs the encrypt.exe on the file, the encrypted text will come out. The asymmetric chipper is able to solve the problem associated to scalability since everyone will require one private key and one public key in order to communicate with another person. (Katz, & Lindell, 2007). However, asymmetric encryption is quite slow compared symmetric ciphers.
The paper also discusses the symmetric encryption to enhance a greater understanding the difference between symmetric encryption and asymmetric encryption. The symmetric encryption uses the same symmetric key to encrypt and decrypt a text. For example, two individuals want to keep a message a secret. The first person will use a key to encrypt the message. In essence, the original message is referred as plaintext while the encrypted text is referred as ciphertext.
If the first person sends the cipher text to the second person, the same symmetric cipher will be used decrypt the text. The most widely used symmetric algorithm is the symmetric key cryptography, which is known as Advanced Encryption Standard (AES). The AES are three block ciphers that comprises of AES-192, AES-128, and AES-256. Each of the cipher is sufficient enough to protect a classified information. (Katz, & Lindell, 2007). Major benefit of symmetric key is that it is possible to change the key every time two individuals exchange the key.
For example, a key can be randomly generated in one session and if an attacker is able to get hold of the key, the attacker will only be able decrypt message for one session. However, if an attacker gets hold of the same key used for all sessions, the attacker will be able to decrypt all the message. Major shortcoming of symmetric key is that all parties have to exchange the key in order to encrypt the text and decrypt the same text.
The requirement makes symmetric key to face challenges in enhancing a secured key distribution. In the symmetric key, the key space is doubled when a bit is added to the cypher key. However, a longer bit can make symmetric key to be more efficient, however, longer key does not guarantee effective security because a skilled attacker can build pattern of password using a dictionary in order to launch an effective dictionary attack.
The attacker will save time using this strategy because he will be able to avoid the brute force attack. Another problem of symmetric cipher is that it is not scalable. For example, if 1000 people decide to communicate with one another, all of them will need 999 different keys to establish confidentiality and separate communication channels. In the sense, external person can grab the key when it is being transmitted. Based on the analysis of asymmetric and symmetric key, the paper discusses a better encryption algorithm out of asymmetric or symmetric.
Better Encryption Algorithm out of Symmetric or Asymmetric Analysis of both the symmetric and symmetric reveals that asymmetric is better than the symmetric to build an effective security system. For example, the asymmetric can be used to build mail security than the symmetric algorithm. When an individual sends mail to another person, confidentiality of the message sent can be achieved using the symmetric encryption, however, when mail message is being distributed to multiple people, the asymmetric distribution is better.
In the contemporary business environment, hundreds of business people will need to transmit a classified confidential information to one another. In this scenario, the symmetric encryption will not be appropriate in this type of communication, rather, the symmetric algorithms will be appropriate to enhance secure distribution of confidential information. ( Delfs, & Knebl, 2007). In the contemporary business environment, asymmetric uses digital signature to guarantee that security of the message sent and authenticated remotely. Typically, the asymmetric is more effective for the security of data transmitted during electronic commerce.
For example, the SSL is widely used to protect data transmitted during an electronic business transaction. Unlike the symmetric encryption where an identical key is used to encrypt and decrypt information, however, the private key of asymmetric algorithms is never exposed to anybody. While computation of symmetric encryption is faster than the asymmetric algorithms because their encryption process is less complicated than the asymmetric encryption, nevertheless, the asymmetric algorithms are much more secured than the.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.