Draw your conclusion on this table below.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Draw your conclusion on this table below.

 

Symmetric Encryption
Asymmetric Encryption
Both encryption and decryption may be done using
just one key.
It takes two keys to encrypt and decrypt data: one to
encrypt and the other to decrypt.
The encrypted text is the same size as or smaller than The encryption text is the same size as or greater than
the plain text.
the plain text.
When a huge volume of data must be transferred, it is
It's used to send and receive little amounts of data.
used.
The encryption process is very fast.
The encryption process is slow.
It provides confidentiality, authenticity and non-
repudiation.
It only provides confidentiality.
Examples: 3DES, AES, DES and RC4
When compared to asymmetric key encryption,
symmetric key encryption uses less resources.
Examples: Diffie-Hellman, ECC, EI Gamal, DSA and RSA
Resource usage is high in asymmetric key encryption.
Transcribed Image Text:Symmetric Encryption Asymmetric Encryption Both encryption and decryption may be done using just one key. It takes two keys to encrypt and decrypt data: one to encrypt and the other to decrypt. The encrypted text is the same size as or smaller than The encryption text is the same size as or greater than the plain text. the plain text. When a huge volume of data must be transferred, it is It's used to send and receive little amounts of data. used. The encryption process is very fast. The encryption process is slow. It provides confidentiality, authenticity and non- repudiation. It only provides confidentiality. Examples: 3DES, AES, DES and RC4 When compared to asymmetric key encryption, symmetric key encryption uses less resources. Examples: Diffie-Hellman, ECC, EI Gamal, DSA and RSA Resource usage is high in asymmetric key encryption.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Binary numbers
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education