Question

QUESTION There are TWO (2) type of keys involved in encryption, which are symmetric and asymmetric...

QUESTION

There are TWO (2) type of keys involved in encryption, which are symmetric and asymmetric keys. State and describe the keys.

Homework Answers

Answer #1

What is Symmetric Encryption?

Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. This encryption method differs from asymmetric encryption where a pair of keys, one public and one private, is used to encrypt and decrypt messages.

By using symmetric encryption algorithms, data is converted to a form that cannot be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original and understandable form. The secret key that the sender and recipient both use could be a specific password/code or it can be random string of letters or numbers that have been generated by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys must be created using an RNG that is certified according to industry standards, such as FIPS 140-2.

There are two types of symmetric encryption algorithms:

  1. Block algorithms. Set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

  2. Stream algorithms. Data is encrypted as it streams instead of being retained in the system’s memory.

Some examples of symmetric encryption algorithms include:

  • AES (Advanced Encryption Standard)

  • DES (Data Encryption Standard)

  • IDEA (International Data Encryption Algorithm)

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.

Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption.

Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret.

Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message.

Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key.

The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Q4: Choose the correct answer [2 marks] a. In … cryptosystems, one algorithm is used for...
Q4: Choose the correct answer [2 marks] a. In … cryptosystems, one algorithm is used for encryption and a related algorithm for decryption with a pair of keys, one for encryption and one for decryption (symmetric/asymmetric) b. A … number generator uses a nondeterministic source to produce randomness (true random, pseudo random) c. To ensure the … service, a server disconnects a client if he/she sends a large number of requests that exceeds the server’s threshold (access control/availability) d. Eavesdropping...
1) What are the advantages of hollow asymmetric membrane compared to symmetric membrane ? 2) What...
1) What are the advantages of hollow asymmetric membrane compared to symmetric membrane ? 2) What are the advantages of hollow fiber membranes compared to other geometries ? when would one use another geometries? 3) In large membrane systems its common to have membranes cascades with membrane arranged boh in parallel and in series. What are the advantaes of this ? The arrangement after the first set of membranes in series usually will have fewer members in parallel, This has...
Shift cipher question: Show that the ciphertext “NYVVC” can be decrypted into two meaningful English words....
Shift cipher question: Show that the ciphertext “NYVVC” can be decrypted into two meaningful English words. Find out those words and the corresponding encryption keys.
Question 7 (1 point) Which of the following statements is false? Question 7 options: Asymmetric information...
Question 7 (1 point) Which of the following statements is false? Question 7 options: Asymmetric information can exist both before and after a transaction. Moral hazard occurs when one party to a transaction changes his or her behavior in a way that is hidden from and costly to the other party. Adverse selection has the potential to eliminate some markets. none of the above
In polycystic ovary disease the excessive estrogen-type hormones are not involved in which of the following?...
In polycystic ovary disease the excessive estrogen-type hormones are not involved in which of the following? Question 18 options: 1) hirsutism 2) increased luteinizing hormone 3) prevention of ovulation 4) endometrial proliferation 5) suppression of follicle stimulating hormone In chronic kidney disease, the osteodystrophies are not associated with which of the following? Question 21 options: 1) a decrease in renal elimination of phosphate 2) an increase in parathyroid hormone 3) a decrease in the activation of vitamin D by the...
Question 28 options: You want to know what is the optimal amount of sleep to maximize...
Question 28 options: You want to know what is the optimal amount of sleep to maximize cognitive performance. You conduct a study in which 4 participants are randomly assigned to each of 4 conditions. The condition differ only in how many hours of sleep they receive per night. You install an app on the participants’ phones which wakes them up every morning after the prescribed number of hours of sleep. After two weeks, you give all of the participants a...
Let A be an symmetric matrix. Assume that A has two different eigenvalues ?1 ?= ?2....
Let A be an symmetric matrix. Assume that A has two different eigenvalues ?1 ?= ?2. Let v1 be a ?1-eigenvector, and v2 be and ?2-eigenvector. Show that v1 ? v2. (Hint: v1T Av2 = v2T Av1.)
Question 810 pts What type of reaction and how much energy is involved in a reaction...
Question 810 pts What type of reaction and how much energy is involved in a reaction of silicon tetrachloride with water? SiO2(s) +4HCl(g) ⟷ SiCl4(g) + 2H2O(g) ΔH= +139.5 kJ/mole Group of answer choices Endothermic with ΔH = -139.5 kJ/mole. Exothermic with ΔH = -139.5 kJ/mole. Endothermic with ΔH = +139.5 kJ/mole. Exothermic with ΔH = -0.007168 kJ/mole. Exothermic with ΔH = +139.5 kJ/mole.
Which type of tumor antigen is least likely to be involved in melanoma, a cancer that...
Which type of tumor antigen is least likely to be involved in melanoma, a cancer that typically results from DNA damage by ultra-violet rays? Group of answer choices: A.Virally encoded proteins B.Proteins derived from the reactivation of embryonic genes C.Spliced peptides D.Self proteins that are expressed at unusually high levels E.Peptides derived from self proteins that have undergone coding mutations
Define/describe the following lease terms: 1. Lease 2. The two parties involved in the lease. 3....
Define/describe the following lease terms: 1. Lease 2. The two parties involved in the lease. 3. Operating vs Financing Lease 4. Interest Only vs. Sales-Type Lease 5. Guaranteed Residual Value and its impact on the NPV of Minimum Lease Payment calculation 6. Accounting for Executory Costs if the Lessee pays for these 7. Triple Net Lease 8. Discuss how depreciation calculation is different between a lease with a title transfer or bargain purchase option vs a lease that does not...