OCU ISCAP A Week 02 Lesson 08 Discussion
- This topic has 1 reply, 4 voices, and was last updated 1 week, 5 days ago by .
- You must be logged in to reply to this topic.
Home » Topics » OCU ISCAP A Forum » OCU ISCAP A Weekly Discussions » OCU ISCAP A Week 02 Lesson 08 Discussion
Explain the specific differences between symmetric cryptography (chapter 7) and asymmetric cryptography. Use terms from both chapters. Be sure to compare the pros and cons of each.
Symmetric cryptography encrypts data in blocks of sixty-four bits, due to computer technology of the time of implementation. The key to encrypt and decrypt the data is a stream of ones and zeros, of varying size from sixty-four to four hundred and forty-eight bits. The same key is used to encrypt and decrypt the data. Symmetric cryptography is faster to decrypt and encrypt and the key is shared between both users, providing confidentiality and access controls. Symmetric being faster to compute makes it less secure. Symmetric is better to encrypt larger amounts of data.
Asymmetric cryptography encrypts data using two keys, one public key for encrypting and the private key for decrypting. Key sizes can be much larger the symmetric and takes significantly more time to encrypt and decrypt, so it is best used for small amount of data due to time. The key exchange is more secure as it is handled by the PKI, a third-party system to maintain integrity. Asymmetric encryption offers better security and tamper proof.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.