Business > CASE STUDY > Milestone II Cryptography.docx ISOL – 535 Milestone II – Asymmetric & Symmetric (All)
Milestone II Cryptography.docx ISOL – 535 Milestone II – Asymmetric & Symmetric Encryption University of Cumberlands ISOL – 535 – B05 Cryptography Encryption gene... rally is the process of converting different types of data into codes, especially intending to prevent access to the information by unauthorized persons. In the current world, there are mainly two types of encryption, asymmetric and symmetric encryption. To start with, symmetric encryption is whereby only one key, that is, a secret key, is used to both encrypt and decrypt the selected electronic information (Zebari. et al. 2018). For a decryption process to occur, legal entities and values involved in symmetric encryption must interchange the secret key. On the contrary, asymmetric encryption uses mathematical keys and values to encrypt and decrypt data. The public key encrypts data while its alternate private key decrypts it. Symmetric encryption uses a single key that is shared amongst the users that are intending to receive certain information, while symmetric encryption uses numerous keys to encrypt and decrypt information; thus, its known as a public key due to its tendency to be accessed by a large number of people (Yang. et al. 2021). In the past, many people commonly used symmetric encryption because it was fast, and it served a large number of people. However, keeping the key secret posed a major problem as encryption and decryption were done differently. On the other hand, the current world prefers asymmetric encryption a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 1 year ago
Preview 1 out of 3 pages
Connected school, study & course
About the document
Uploaded On
Jul 23, 2022
Number of pages
3
Written in
This document has been written for:
Uploaded
Jul 23, 2022
Downloads
0
Views
46
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·