This website uses cookies to ensure you have the best experience. Learn more

Symmetric Key Encryption Essay

743 words - 3 pages

Symmetric key encryption is also known as shared-key, single-key, secret-key, and private-key or one-key encryption. In this type of message encryption, both sender and receiver share the same key which is used to both encrypt and decrypt messages. Sender and receiver only have to specify the shared key in the beginning and then they can begin to encrypt and decrypt messages between them using that key. Examples include AES (Advanced Encryption Standard) and TripleDES (Data Encryption Standard).
- Simple: This type of encryption is easy to carry out. All users have to do is specify and share the secret key and then begin to encrypt and decrypt messages.
- Encrypt and decrypt ...view middle of the document...

The private key is kept secret and is used to decrypt received messages. An example of asymmetric key encryption system is RSA.
- Convenience: It solves the problem of distributing the key for encryption.Everyone publishes their public keys and private keys are kept secret.
- Provides for message authentication: Public key encryption allows the use of digital signatures which enables the recipient of a message to verify that the message is truly from a particular sender.
- Detection of tampering: The use of digital signatures in public key encryption allows the receiver to detect if the message was altered in transit. A digitally signed message cannot be modified without invalidating the signature.
- Public keys should/must be authenticated: No one can be absolutely sure that a public key belongs to the person it specifies and so everyone must verify that their public keys belong to them.
- Slow: Public key encryption is slow compared to symmetric encryption. Not feasible for use in decrypting bulk messages.
- Uses up more computer resources: It requires a lot more computer supplies compared to single-key encryption.


Other Papers Like Symmetric Key Encryption

Cmit425 Essay

645 words - 3 pages information, etc. it is therefore a never ending cycle of secure cryptology been developed, others trying to find loopholes in such systems and more developments made to address the loopholes and make the system more secure. Question Two: Symmetric-key cryptography refers to a method of encryption that uses a single key for both the encryption and the decryption. The receiver and the sender use keys that are related. The major drawback of

Quiz 2 Study Guide Essay

1681 words - 7 pages examples of malicious code except: A) viruses. B) bots. C) worms. D) sniffers. 35. Symmetric key encryption is also known as: A) public key encryption. B) secret key encryption. C) PGP. D) PKI. 36. All the following statements about symmetric key encryption are true except: A) in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a

Network Security

966 words - 4 pages same secret key for encryption and decryption. One of the drawbacks with symmetric keys is that if the key is compromised on one end, it is compromised on both ends. With asymmetric keys, also known as public key encryption, the sender and the receiver each use a different key for encryption and decryption. These keys are known as the public key and a secret key. The public key is used to encrypt data, which the recipient can then decrypt using

Encryption a Means of Security

4201 words - 17 pages Encryption Techniques in Database Security Symmetric cryptography, also called private-key cryptography, is one of the oldest and most secure encryption methods. The term "private key" comes from the fact that the key used to encrypt and decrypt data must remain secure because anyone with access to it can read the coded messages. A sender encodes a message into ciphertext using a key, and the receiver uses the same key to decode it. People can

Input Controls

837 words - 4 pages main types of encryption are asymmetric encryption and symmetric encryption. Asymmetric encryption uses two keys that are mathematically related and are known as the public key (known to everyone and can be freely distributed) and the private key (known only to the recipient of the message) (Ciampa, 2009). Symmetric encryption, also known as private key encryption, uses the same key to decrypt and encrypt messages. An important feature of


1857 words - 8 pages ] The principle behind this particular technique is that the encryption and the decryption key used are essentially the same and works assuming that the sender and the receiver (only) know this symmetric/secret key. It is usually pretty simple to cipher and decipher using this technique and hence there is lack of enough security. The figure explains data transmission: Alice encrypts the message using the agreed secret key(that is usually

Is3230 Unit 9 Lab 9

820 words - 4 pages . Provide and explanation for the difference between symmetric keys and asymmetric keys in a PKI? symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message

Virtual Private Network

2502 words - 11 pages implement a VPN, but a firewall can also be used to terminate the VPN sessions. [pic] Encryption Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Most computer encryption systems belong in one of two categories: ▪ Symmetric-key encryption ▪ Public-key encryption In symmetric-key encryption, each computer


612 words - 3 pages . When employee A wants to send a secure message to employee B, you use the employee B’s public key to encrypt the message. Employee B, then uses their private key to decrypt it. Public Key cryptography, is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption). Next, for my example of a process that utilizes asymmetric cryptography, is Digital Signatures. I will be using employee’s A and B as my

Issc362 Quiz 1

939 words - 4 pages encryption | | | B.Asymmetric encryption | | | C.Non-symmetric encryption | | | D. No type of encryption uses the same key to encrypt and to decrypt information | | Answer Key: A | | | Question 16 of 20 | 5.0 Points | Which of the following involves overwriting all of the information on a drive? | | A.Degaussing | | | B.Zeroization | | | C.Drive wiping | | | D.Deleting | | Answer Key: C

Client And Server Security

5360 words - 22 pages will add an additional layer of security to this network (Microsoft, 2012).   Wireless and Remote Access Security Symmetrical key encryption is a group of algorithms that use the same keys for plain text and ciphertext encryption. These keys are known by both the sender and receiver of the data, and are used to share a private link of communication. Symmetric key can use either block or stream ciphers to encrypt data. When using the

Related Essays

Case Study

556 words - 3 pages most important. Understanding the differences between the two will help in making the appropriate decision. Symmetric Symmetric key cryptography requires the use of one shared key for the encryption process. While the algorithm of the symmetric encryption method is very secure, it is the key disbursement that creates a downfall to this choice. When using one shared key to decrypt and encrypt, information can be compromised if that key is

Select Appropriate Algorithms Essay

401 words - 2 pages Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods: Data Encryption Standard (DES) Rivest, Shamir, and Adleman (RSA) encryption algorithm Triple DES Diffie-Hellman key exchange International Data Encryption Algorithm (IDEA) El Gamal encryption algorithm Carlisle Adams and Stafford Taveres (CAST

Chasing Girl Essay

877 words - 4 pages secret way firewall to the Internet , such as black lists. Although the firewall can hit for power to the external network to implement effective protection, but the security of information transmission within the network but could do nothing to achieve the security of e-commerce also need some protection for dynamic security technology. Data encryption Symmetric encryption: symmetric encryption, also known as the private key encryption. The

Public Key Encryption Essay

3491 words - 14 pages , p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption and asymmetric key encryption. Public key encryption uses the asymmetric key approach. We will discuss both methods later. The advent of e-commerce has created a greater need for public-key encryption schemes to provide security and privacy during online ordering, banking, bill payment, and other