Compare symmetric key algorithms with public key algorithms. What are the benefits/drawbacks of each type of algo- rithm? How are these differences manifested in the real world uses of these two types of algorithms?

What will be an ideal response?


In symmetric-key encryption, the same key is used to both encrypt and decrypt a message. Public-key cryptography
is an asymmetric encryption method. It uses two inversely-related keys to encrypt and decrypt a message.

The benefit of using symmetric-key cryptography is that it takes less computing time and power than public-key encryp-
tion and that new keys can be used for each communication session. However, symmetric-key cryptography creates key

management problems, as there are more keys that need to be kept secret, and key distribution problems, as distributing
keys securely so they are not compromised can be difficult. An additional drawback is that there is no way to authenticate
each party in the transaction, since both the sender and the receiver use the same secret key, .
The benefit of public-key cryptography is that each person only needs one key pair, with a private key that is kept secret
and a public key that is published. As a result, each person only needs to protect the privacy of one key—their private key.
Thus, there is less of a key management burden. Public-key cryptography (and the use of digital signatures) allows for
authentication of both parties in a transaction. The drawback of public-key cryptography is that it takes more computing
time and power to process than symmetric key cryptography. Therefore, public-key cryptography is often used to securely
exchange secret symmetric keys for a communication session.

Computer Science & Information Technology

You might also like to view...

What does the keyword public mean in a class declaration?

A. public functions can only be seen by other class members. B. public members can be seen by any other parts of the program and accessed via an object. C. public functions cannot see any other parts of the class. D. public members can only be seen by other class members.

Computer Science & Information Technology

________ is the process of modifying a presentation by adding and deleting slides or by changing the contents of individual slides

A) Editing B) Saving C) Presenting D) Formatting

Computer Science & Information Technology

Put the following equations into the slop-intercept form (y = + b) and read the value of the slope and y-intercept.

2x = 3y + 4 y = (2/3)x + (-- 4/3) Slope = +2/3

Computer Science & Information Technology

A(n)________ query displays an input box that asks for criteria each time the query is run

A) input B) parameter C) sub D) argument

Computer Science & Information Technology