Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)ISSO C Discussion Lesson 08

Viewing 2 reply threads
  • Author
    Posts
    • #93549
      Manny Varela
      Keymaster

      Explain the specific differences between symmetric cryptography (chapter 7) and asymmetric cryptography.  Use terms from both chapters.  Be sure to compare the pros and cons of each.

    • #106205
      Ashly Jackson
      Participant

      Symmetric and asymmetric cryptography are two foundational methods used for secure data encryption, each with distinct characteristics and applications.

      Symmetric cryptography, as discussed in Chapter 7, involves a single key that both the sender and receiver use for encryption and decryption. The main advantages of this approach include speed and efficiency; symmetric algorithms, like AES (Advanced Encryption Standard), are typically faster and less resource-intensive, making them suitable for large data volumes. However, the major drawback is the key distribution problem. If the key is intercepted during transit, the security of the encrypted data is compromised, as anyone with access to the key can decrypt the information.

      In contrast, asymmetric cryptography utilizes a pair of keys: a public key for encryption and a private key for decryption. This method enhances security, as the public key can be shared openly without exposing the private key. A common example is RSA (Rivest-Shamir-Adleman). Its primary advantages include improved key distribution and the ability to provide digital signatures. However, asymmetric cryptography tends to be slower and more computationally intensive than symmetric encryption, making it less efficient for encrypting large datasets.

      In conclusion, while symmetric cryptography offers speed and efficiency, its security relies heavily on key management. Asymmetric cryptography improves key distribution and adds extra layers of security through public-private key pairs but at the cost of speed and resource consumption. Both methods have important roles in securing communications, often used together in hybrid encryption systems.

    • #106256
      Amy Hastings
      Participant

      Symmetric Cryptography is a key cryptography meaning that it only uses one key that it used by the sender as well as the receiver. The sender and receiver use this key to communicate secretly so just they know what the message is. This also does help keep their conversation private.

      A con of symmetric cryptography is that if the key is not safely transmitted then it can lead to a vulnerability towards the users. The key has to be transmitted safely so it cannot get interrupted while its being transmitted. Another con is that if the key somehow gets compromised this will also cause your data to become at risk.
      A pro of symmetric cryptography is that it is a lot faster using one key and it requires less work than that of the asymmetric cryptography. The symmetric cryptography is also less expensive than the asymmetric cryptography.

      Asymmetric Cryptography is where the company uses two keys, and they are a public and a private key. The use of each is pretty simple, the public key is usually shared between people while the private key is kept secret between other people. One is also used for encryption while the other is used for decryption.

      Pros of asymmetric cryptography is that it has a lot more security than symmetric cryptography does because with this one you do not have to exchange keys back and forth. It also uses things like online signatures that the sender has to sign so that way the receiver can use the private key to verify it, so it is more protected.
      Cons of asymmetric cryptography is that it is slower than the symmetric cryptography is and this causes it to not be able to hold a large amount of data encryption. Another is that if you have the private key then anyone that has access to it can unfortunately disrupt your data.

Viewing 2 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.