Reply To: OCU C)SP B Week 04 Lesson 09 Discussion
Cryptography Methodologies are essential to every company using Internet accessible devices. There are several different types of methodologies used in cryptography. Each type of encryption should be used for specific scenarios. Some of the most common types of encryptions are asymmetric encryption, symmetric encryption, Data encryption standard and advanced encryption standard. These encryptions alongside algorithm’s facilitate the protection of our data. When trying to encrypt large bulks of data or protecting payment information in the form of credit cards, companies typically use symmetrical encryptions. Symmetric encryption allows the system to move faster than asymmetric when trying to process information at higher speeds. Symmetric encryption allows safety of the data using a one key encryption. Symmetric encryption requires the same key used to encrypt the message also be used to decrypt the message. The message is sent using permutations. Using the same key for encrypting and decrypting can cause potential security risk as explained in article from Key Factor “people (or technology) who want to correspond via symmetric encryption must share the key to do so, and if the channel used to share the key gets compromised, so does the entire system for sharing secure messages since anyone with the key can encrypt or decrypt those communications.” When to use symmetric encryption vs. asymmetric encryption (2023) When security is a top priority and time constraints are not as huge of an issue asymmetric encryption is used. Asymmetric encryption provides more security than symmetric. With asymmetric encryption two distinct types of permutations are used whereas with symmetrical encryption only one type of permutation is used. Asymmetric encryption is used for things like digital signatures, block chains, and public key infrastructures.