Case Study Type of Key Asymmetric or Symmetric

412 Words2 Pages
Type of Key Asymmetric or Symmetric The two basic techniques of encrypted information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) These two types of encryption provided layers security. Symmetric encryption is the best-known and oldest technique. A secret key applied as number, a word, or string of random letters, are applied to the text of a message to changing the content in a particular way. This is achieved by shifting each letter by a number of places in the alphabet. Both the sender and recipient know the secret key, enabling both to encrypt and decrypt all messages by the use of this key. A related issue with secret keys is the exchange over the Internet or a network attempting to prevent them from being hijacked. Once the secret key is retrieved legally or illegally anyone can decrypt the message. An answer to this issue is asymmetric encryption, a two related keys or a key pair. One key is made freely public available to anyone wanting to send you a message. The second, private key is kept secret, only known to you. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key. The publishing of the first key elevates the worries of being hijacked (the keys are supposed to be public). The main issue of with asymmetric encryption is that it is slower than symmetric encryption. It requires more processing time for both encrypting and decrypting the message. Digital certificates or certifications to resolve publishing keys related to asymmetric encryption is another method to conquering user identification. Certificates are packages

More about Case Study Type of Key Asymmetric or Symmetric

Open Document