OCU C)ISSO C Discussion Lesson 08
- This topic has 2 replies, 5 voices, and was last updated 1 month ago by
Amy Hastings.
-
AuthorPosts
-
-
February 15, 2024 at 4:11 pm #93549
Manny Varela
KeymasterExplain the specific differences between symmetric cryptography (chapter 7) and asymmetric cryptography. Use terms from both chapters. Be sure to compare the pros and cons of each.
-
May 27, 2025 at 12:43 pm #106205
Ashly Jackson
ParticipantSymmetric and asymmetric cryptography are two foundational methods used for secure data encryption, each with distinct characteristics and applications.
Symmetric cryptography, as discussed in Chapter 7, involves a single key that both the sender and receiver use for encryption and decryption. The main advantages of this approach include speed and efficiency; symmetric algorithms, like AES (Advanced Encryption Standard), are typically faster and less resource-intensive, making them suitable for large data volumes. However, the major drawback is the key distribution problem. If the key is intercepted during transit, the security of the encrypted data is compromised, as anyone with access to the key can decrypt the information.
In contrast, asymmetric cryptography utilizes a pair of keys: a public key for encryption and a private key for decryption. This method enhances security, as the public key can be shared openly without exposing the private key. A common example is RSA (Rivest-Shamir-Adleman). Its primary advantages include improved key distribution and the ability to provide digital signatures. However, asymmetric cryptography tends to be slower and more computationally intensive than symmetric encryption, making it less efficient for encrypting large datasets.
In conclusion, while symmetric cryptography offers speed and efficiency, its security relies heavily on key management. Asymmetric cryptography improves key distribution and adds extra layers of security through public-private key pairs but at the cost of speed and resource consumption. Both methods have important roles in securing communications, often used together in hybrid encryption systems.
-
June 1, 2025 at 9:42 pm #106256
Amy Hastings
ParticipantSymmetric Cryptography is a key cryptography meaning that it only uses one key that it used by the sender as well as the receiver. The sender and receiver use this key to communicate secretly so just they know what the message is. This also does help keep their conversation private.
A con of symmetric cryptography is that if the key is not safely transmitted then it can lead to a vulnerability towards the users. The key has to be transmitted safely so it cannot get interrupted while its being transmitted. Another con is that if the key somehow gets compromised this will also cause your data to become at risk.
A pro of symmetric cryptography is that it is a lot faster using one key and it requires less work than that of the asymmetric cryptography. The symmetric cryptography is also less expensive than the asymmetric cryptography.Asymmetric Cryptography is where the company uses two keys, and they are a public and a private key. The use of each is pretty simple, the public key is usually shared between people while the private key is kept secret between other people. One is also used for encryption while the other is used for decryption.
Pros of asymmetric cryptography is that it has a lot more security than symmetric cryptography does because with this one you do not have to exchange keys back and forth. It also uses things like online signatures that the sender has to sign so that way the receiver can use the private key to verify it, so it is more protected.
Cons of asymmetric cryptography is that it is slower than the symmetric cryptography is and this causes it to not be able to hold a large amount of data encryption. Another is that if you have the private key then anyone that has access to it can unfortunately disrupt your data.
-
-
AuthorPosts
- You must be logged in to reply to this topic.