Question

QUESTION There are TWO (2) type of keys involved in encryption, which are symmetric and asymmetric...

QUESTION

There are TWO (2) type of keys involved in encryption, which are symmetric and asymmetric keys. State and describe the keys.

Homework Answers

Answer #1

What is Symmetric Encryption?

Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. This encryption method differs from asymmetric encryption where a pair of keys, one public and one private, is used to encrypt and decrypt messages.

By using symmetric encryption algorithms, data is converted to a form that cannot be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original and understandable form. The secret key that the sender and recipient both use could be a specific password/code or it can be random string of letters or numbers that have been generated by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys must be created using an RNG that is certified according to industry standards, such as FIPS 140-2.

There are two types of symmetric encryption algorithms:

  1. Block algorithms. Set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

  2. Stream algorithms. Data is encrypted as it streams instead of being retained in the system’s memory.

Some examples of symmetric encryption algorithms include:

  • AES (Advanced Encryption Standard)

  • DES (Data Encryption Standard)

  • IDEA (International Data Encryption Algorithm)

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.

Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption.

Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret.

Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message.

Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key.

The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
QUESTION 1 What does DK(EK(P)) correspond to? Plain Text Cypher Text Gibberish Encryption Key None of...
QUESTION 1 What does DK(EK(P)) correspond to? Plain Text Cypher Text Gibberish Encryption Key None of these QUESTION 2 What is the goal of Cryptanalysis? Attempt to break a single message Attempt to recognize patterns in encrypted messages Attempt to deduce the key Attempt to find weaknesses in the implementation Attempt to break the algorithm All of these QUESTION 3 What is the maximum possible keys in Ceaser cipher? QUESTION 4 Choose ALL that are true for Symmetric Key Encryption...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
1. Describe the difference between base64 and a typical symmetric encryption algorithm like AES. 2. Describe...
1. Describe the difference between base64 and a typical symmetric encryption algorithm like AES. 2. Describe in your own words (no more than 100), what is the linear cryptanalysis?
Q4: Choose the correct answer [2 marks] a. In … cryptosystems, one algorithm is used for...
Q4: Choose the correct answer [2 marks] a. In … cryptosystems, one algorithm is used for encryption and a related algorithm for decryption with a pair of keys, one for encryption and one for decryption (symmetric/asymmetric) b. A … number generator uses a nondeterministic source to produce randomness (true random, pseudo random) c. To ensure the … service, a server disconnects a client if he/she sends a large number of requests that exceeds the server’s threshold (access control/availability) d. Eavesdropping...
1) What are the advantages of hollow asymmetric membrane compared to symmetric membrane ? 2) What...
1) What are the advantages of hollow asymmetric membrane compared to symmetric membrane ? 2) What are the advantages of hollow fiber membranes compared to other geometries ? when would one use another geometries? 3) In large membrane systems its common to have membranes cascades with membrane arranged boh in parallel and in series. What are the advantaes of this ? The arrangement after the first set of membranes in series usually will have fewer members in parallel, This has...
Which of these is necessary before two parties can use a symmetric cryptographic algorithm? A key...
Which of these is necessary before two parties can use a symmetric cryptographic algorithm? A key they both know. A one-time pad. A communication Channel None of the above. How can two people realistically get a common key to use in a cipher? The algorithm automatically provides it Ciphers do not require a common key You can use quantum entangled elections. It can be done either meeting in person, or by a secure key exchange What is the fundamental idea...
Shift cipher question: Show that the ciphertext “NYVVC” can be decrypted into two meaningful English words....
Shift cipher question: Show that the ciphertext “NYVVC” can be decrypted into two meaningful English words. Find out those words and the corresponding encryption keys.
Question 7 (1 point) Which of the following statements is false? Question 7 options: Asymmetric information...
Question 7 (1 point) Which of the following statements is false? Question 7 options: Asymmetric information can exist both before and after a transaction. Moral hazard occurs when one party to a transaction changes his or her behavior in a way that is hidden from and costly to the other party. Adverse selection has the potential to eliminate some markets. none of the above
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter by a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
In polycystic ovary disease the excessive estrogen-type hormones are not involved in which of the following?...
In polycystic ovary disease the excessive estrogen-type hormones are not involved in which of the following? Question 18 options: 1) hirsutism 2) increased luteinizing hormone 3) prevention of ovulation 4) endometrial proliferation 5) suppression of follicle stimulating hormone In chronic kidney disease, the osteodystrophies are not associated with which of the following? Question 21 options: 1) a decrease in renal elimination of phosphate 2) an increase in parathyroid hormone 3) a decrease in the activation of vitamin D by the...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT