Asymmetric or Symmetric

637 Words3 Pages
Asymmetric or Symmetric In this paper I will explain whether ABC Institute of Research the company I work for should use asymmetric or symmetric keys. I will explain the advantages and disadvantages of both and pick the best one out of the two that I think would be better for our uses. Today I have been given the task to figure out whether asymmetric or symmetric keys would be better for our use to keep our information with research of genetics secret. With these things in mind I will do research on both and make a conclusion about which one I think will work best for us and compare and contrast the two of them to help us better understand which one would benefit us the most. First we will start with asymmetric. Asymmetric public keys are a cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Starting off a network user receives a public and private key pair from a certificate authority. Any other user who wants to send an encrypted message can get the intended persons public key from a public directory. They use this key to encrypt the message, and they send it to the recipient. When the recipient gets the message, they decrypt it with their private key, which no one else should have access to. The sender encrypt the message using the common algorithm and his own secret key, then they sign the result, encrypt it again using the recipient’s public key, and send it. The recipient then decrypts the received message using their own secret key, which identifies the sender from their signature, and then decrypts the result using the sender’s public key. This will ensure the recipient that whoever composed the message had access to the sender’s private key and that nobody tampered with the message or read it along the way. Asymmetric algorithms seem to be more suited for real world use: As the secret key does

More about Asymmetric or Symmetric

Open Document