Compare and contrast symmetric encryption with public-key encryption, including the strengths and weaknesses of each

What will be an ideal response?


Scalability: with public-key encryption, multiple users can send encrypted mes
sages to Alice using her public key and these messages can be decrypted only by Alice;
thus, a linear number of public-private key pairs need to be established, distributed and
protected to allow pairwise confidential communication between any two users; instead,
symmetric encryption requires a quadratic number of secret keys. Efficiency: existing sym
metric encryption methods are much faster and use much shorter keys than existing public
key encryption methods. Usability: symmetric-key encryption is easier to understand by
an non-expert than public-key encryption.

Computer Science & Information Technology

You might also like to view...

Which of the following is used when more than one choice may be selected?

A) check box B) sliders C) drop-down list box D) list box E) radio button

Computer Science & Information Technology

When you copy a selection of cells using drag and drop, which appears before you release the mouse button?

A. an outline of the new location of the selected range B. the range C. a cell reference of the old location D. shortcut tip

Computer Science & Information Technology

Unlike graphic symbols, buttons have four _____.

A. Frames B. Sides C. Layers D. States

Computer Science & Information Technology

In a class definition, operations are specified in

a) properties. b) records. c) attributes. d) methods.

Computer Science & Information Technology