Introduction The use of encryption is the method that people use to exchange messages and information over the Internet. That is because sending messages over the Web is totally insecure and unreliable Arturo Vidal Chile Jersey , and so two methods are in use, the symmetric and asymmetric encryption. Symmetric key encryption uses two keys, one key is public, and the other is private. When you encrypt data using the public key Alexis Sanchez Chile Jersey , it is only the person with the private key that can decrypt that data. The asymmetric key encryption, on the other hand, has two keys. The public key is accessible to everyone while the private key is only available to the owner. The difference comes when learning the private key whereby with the asymmetric encryption you cannot learn the private key from the public one as in the case of symmetric key encryption. Pros of symmetric key encryption Pros 鈥?Encrypting and decrypting symmetric key data is easy and this provides a good reading as well as writing performance. 鈥?In the symmetric cryptosystems, one can send encrypted data on a link even when there si a possibility that there will be an interception (Pfleeger Pablo Hernandez Chile Jersey , & Pfleeger, 2003). That is because there is no transmission of te key together with the data. 鈥?The system that can decrypt the message is the one that has the secret key. 鈥?In symmetric encryption, there is the usage of a password authentication to prove the identity of the receiver. Cons 鈥?With the symmetric key cryptosystems, there is a problem of key distribution. One must transmit the secret key to the receiving system before sending the message (Kahate Nicolas Castillo Chile Jersey , 2013). 鈥?Symmetric encryption does not offer digital signatures that are difficult to repudiate. Asymmetric key encryption Pros 鈥?There is no need for exchanging keys and thus eliminates the problems of key distribution. 鈥?The security of communication is high because one does not have to reveal the private keys to anyone. 鈥?It also allows the provision of digital signatures that can have repudiation. Cons 鈥?Speed: there are intensive computations required to decrypt the message, and this makes the asymmetric key encryption slow. 鈥?Certification issues: Many public key systems make us of third parties to certify the reliability of public keys. If somebody compromises the third party, the person can fool people and issue false certificates that mean data will be sent to the wrong place (Kahate, 2013). 鈥?Direct compromise: one can jeopardize the security of data by finding a loophole in the mathematics and then crack the encryption. The appropriate method The type of encryption that one should use is the symmetric key encryption because it is only the private key has to be secret Mauricio Pinilla Chile Jersey , and this key is only with one party. That makes security be an assurance especially when there is has been no meeting of the two parties previously. Because the private key is only with one party, there is no transmission of the same to another party over the potentially insecure networks (Pfleeger, & Pfleeger, 2003). However Mauricio Isla Chile Jersey , there should be a guarantee of the authenticity of the third party that is responsible for issuing the certificate. The asymmetric pair of keys can remain unchanged for many sessions of even for many years. You can also use the public keys to implementing digital signatures that incorporate nonrepudiation. It also reduces the number of required keys that are in the requirement in the case of symmetric key cryptography on a large network because one key pair is only with one party (Katz & Lindell, 2007). Security issues identified One of security issues with the asymmetric key cryptography is having a hole behind the mathematics used for encrypting the data. That can give an opportunity to a criminal to compromise the confidentiality of data. The criminal can then send the data to another party that is not the actual recipient of the information. Another thing also worth noting is that computational power is increasing and with today鈥檚 powerful computers it is possible to carry out computations of many values and come up with the decryption key. There is also false security provided by the asymmetric key encryption in the sense that the information sent is only secure when it is travelling over the Internet (Kahate, 2013). When the recipient receives the message and leaves their computers unprotected of do not put the information in a secure place and an intruder can get access to the message and, therefore Matias Fernandez Chile Jersey , compromise its security. Conclusion Technology is making it easy for one party to communicate with another that could be far away from on the globe. It is, therefore, commonplace that there will be the sending and receiving of confidential information to which a third party should not have access. Ensuring the secure transmission of .messages is thus of paramount importance and the parties should have a way of ensuring that they have secure ways to do that. Symmetric key encryption of the message is easy and fast, but it is unreliable and insecure. It is prudent to use of asymmetric key cryptography as it is more secure that the symmetric. 鈥?br > 鈥?br > References
Kahate Mark Gonzalez Chile Jersey , A. (2013). Cryptography and network security. New Delhi: McGraw Hill Education. Katz, J. & Lindell, Y. (2007). Introduction to Modern Cryptography. CRC Press. Pfleeger, C. P. & Pfleeger Marcelo Diaz Chile Jersey , S. L. (2003). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR.
Sherry Roberts is the author of this paper. A senior editor at Melda Research in buy essay online if you need a similar paper you can place your order for a custom research paper from Online Essay Writing Services.
More About the Author
Author is associated with which is a global Custom Essay Writing and Term Paper Writing Compan