✍ ️Get Free Writing Help
WhatsApp

SYMMETRIC AND ASYMMETRIC ENCRYPTION 4 Running head: SYMMETRIC AND ASYMMETRIC ENCRYPTION 1

SYMMETRIC AND ASYMMETRIC ENCRYPTION 4

Running head: SYMMETRIC AND ASYMMETRIC ENCRYPTION 1

Symmetric and Asymmetric Encryption

Name

Institutional Affiliation

Date Submitted

As all people understand, each time, our sensitive data or information must be confined. There are many ways used to protect data however for the most part as it comes to confining data such as in the people’s emails we use symmetric or asymmetric encryption. In the basic protection, level each encryption method may be classified as being symmetric or asymmetric-one main encrypts with the other decrypts (Engel, Goerg, & Yu, 2012). The basic, which could be the most significant to the business, is the asymmetric encryption.

The public key encryption also referred to as asymmetric encryption implies which one have the public key with another private key. A public key may be provided away liberally to whomever needs it with simply a public key one’s data may not be read or accessed since people would require a private key in decrypting one’s data (Engel, Goerg, & Yu, 2012). For instance, when one sent out his public key to all people who email him, they would all be capable of sending one’s encrypted emails, which only one would be capable of decrypting and reading.

The secret key or symmetric encryption implies that one has one encryption key, which also operates as the decryption key. The easiest method of symmetric encryption in understanding is known as the ROT13, with legend could have people trust Julius Caesar initially applied it in encrypting orders that go to Roman troops (Martin, 2017). The ROT 13 operates by moving all the letters in the thirteen places of alphabet to the right – B becomes O, A becomes N, and Z becomes M. Since there are 26 characters in the alphabet of English, carrying out ROT13 the second time leads to the original text or email again that is O becomes B, N becomes A, and M becomes Z.

The use of secret key encryption key is fast and easy. However, the symmetric encryption key should be maintained securely where one needs to ensure an individual who requires the key receives it with no risk associated with it being revealed (Martin, 2017). Asymmetric encryption considered slower the secret encryption key. Nevertheless, the public keys asymmetric encryption applies are safe being published anywhere be it on the internet since to receive a private key from the public key might take many years of operation.

The ABC Institute of Research must follow asymmetric encryption when they desire to maintain their confidential data or information safe. By using the asymmetric encryption their data or information will be maintained private implying that, none of this data or information may be shared with unauthorized person or entity (Song, Qin, Liang, & Wang, 2014). The main strength of asymmetric encryption is its capacity to develop a secure conduit over the non-secure channel such as the internet. It is achieved through public keys exchange that may only be applied in encrypting information or data. A corresponding private key that is not shared applied in decrypting.

Nevertheless, compared to secret key encryption, public key encryption enforces a high burden of computation, which tends to be slower. Therefore, it is not generally used to protect payload information or data. Moreover, asymmetric encryption is considered the better option since the firm is pursuing privacy (Song, Qin, Liang, & Wang, 2014). Many people consider symmetric encryption is less secure at the point of protecting information or data as it permits secrets being shared that may be risky in any firm.

In summing up, both the two encryptions have their pros and cons, so it is in the hands of a company to decide that is best to apply. Symmetric encryption is less complicated than the asymmetric encryption. Asymmetric encryption is secure and more of private (Martin, 2017). The company should base its encryption type according to what the company needs to protect and may help them.

References

Engel, C., Goerg, S. J., & Yu, G. (2012). Symmetric vs. Asymmetric Punishment Regimes for Bribery. SSRN Electronic Journal. doi:10.2139/ssrn.1983969

Martin, K. M. (2017). Symmetric Encryption. Oxford Scholarship Online. doi:10.1093/oso/9780198788003.003.0004

Song, L., Qin, J., Liang, S. X., & Wang, X. (2014). A Hybrid Encryption Scheme for Hadoop Based on Symmetric and Asymmetric Encryption. Applied Mechanics and Materials, 598, 691-694. doi:10.4028/www.scientific.net/amm.598.691

The post SYMMETRIC AND ASYMMETRIC ENCRYPTION 4 Running head: SYMMETRIC AND ASYMMETRIC ENCRYPTION 1 appeared first on PapersSpot.

Don`t copy text!