Cooper_Assignment #2

docx

School

American Military University *

*We aren’t endorsed by this school

Course

266

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by UltraLemur3395

Report
Cooper: Assignment 2 Zachary Cooper Cryptography Concepts: ISSC266 Doctor Leonard Simon April 16, 2023
2 Assignment 2 The front door of a house is locked. The couple that lives in the home each have a matching key to unlock the door. This is symmetric, where the same key is used to gain access. The door now has two different keys, one to lock and one to unlock it. Everyone can obtain the key that locks the door but only a select few, the couple that lives in the house, have the key to unlock the door and get insider. This is now asymmetric, where there are two keys, one to encrypt and one to decrypt (Simmons, 1979). This oversimplified example of symmetrical and asymmetrical cryptography covers the concept but there is more that goes into true encryption. Symmetrical means same and asymmetrical means not the same. This is the base level understanding of symmetrical and asymmetrical encryption, regarding the keys (Arnaud, 2023). Symmetric encryption is used commonly with an example being a Caesar cipher. In a Caesar cipher, the plaintext is encrypted using a key, the same key is used to decrypt the information. For electronic communications, a concern is the process of sharing the key. A simple and common way to share a key is by physically passing it off. Other keys are shared throufh means done by large companies like Microsoft. Examples of symmetric encryption are Data Encryption Standard, Advanced Encryption Standard, and TLS/SSL Protocol (Daniel, 2021). Asymmetric encryption uses unique key pairs to decrypt data. Asymmetric encryption involves a known public-key to encrypt plaintext. The only thing that can decrypt the ciphertext after it is encrypted, is the receiver’s private-key. Not only is this process used for secure communications, but it is also used for digital signature verification to ensure messages originate from the correct senders. Symmetric encryption cannot do this. Examples of Asymmetric
3 Assignment 2 encryption are Rivet Shamir Adleman, Elliptical Curve Cryptography, and TLS/SSL protocol (Daniel, 2021). When comparing symmetric and asymmetric encryption, some factors to consider are the security, speed, and use of each. Each method has its own advantages and disadvantages. A blaring disadvantage of symmetric encryption is the shared key. If key is obtained by someone outside the process, they can decrypt any information. When it comes to speed, symmetric encryption is faster than asymmetric due to it having a shorter key length. Advanced Encryption System in symmetric encryption is very secure and a brute force attack would take billions of years to get into it without knowing the key. Asymmetric encyption’s selling point is that keys do not need t be exchanged or distributed. Also, asymmetric can conduct authentication. Asymmetric is slower due to having longer key length and calculations are more complex than symmetric encryption. Speed and security go hand in hand, higher speeds have less security while higher security have lower speeds (Daniel, 2021).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Assignment 2 References Arnaud. (2023). Symmetric vs Asymmetric Encryption: What’s the difference? https://blog.mailfence.com/symmetric-vs-asymmetric-encryption/#:~:text=The%20main %20difference%20is%20that,private%20key%20to%20decrypt %20information.&text=Both%20symmetric%20and%20asymmetric%20algorithms %20provide%20authentication%20capability. Daniel, B. (2021). Symmetric vs. Asymmetric Encryption: What's the Difference? https://www.trentonsystems.com/blog/symmetric-vs-asymmetric-encryption Simmon, G. (1979). Symmetric and Asymmetric Encryption. https://www.princeton.edu/~rblee/ELE572Papers/CSurveys_SymmAsymEncrypt- simmons.pdf