Document Preview:
Symmetric Cryptography vs Asymmetric Cryptography Course Name Student’s Name Date Table of Contents TOC \o "1-3" \h \z \u Definition PAGEREF _Toc506301987 \h 2Symmetric Cryptography PAGEREF _Toc506301988 \h 3.Asymmetric Cryptography PAGEREF _Toc506301989 \h 3Conclusion PAGEREF _Toc506301990 \h 4 CRYPTOGRAPHY DefinitionCryptography is the process of securely storing and transmitting data/ in a form only intelligible and accessible to the intended user. Cryptography ensures the confidentiality and integrity of data. It also reduces the chance of the sender repudiating that he did not create and send the respective data received. Furthermore cryptography enables the verification of order to verify the public keys. ConclusionThe benefits of asymmetric outweigh those of symmetric cryptography thus making it the technique of choice for a majority of end users. Asymmetric is well suited for modern day use since it is robust and versatile. Bulk data transmissions uses symmetric encryption whereas secure exchange of secret keys uses asymmetric encryption. References Katz J. & Lindell Y. (2014). Introduction to modern cryptography. CRC press. Tripathi R. & Agrawal S. (2014). Comparative study of symmetric and asymmetric cryptography techniques. International Journal of Advance Foundation and Research in Computer (IJAFRC) 1(6) 68-76. [...]
Order Description:
In this exercise you will write a short paper that addresses the following 2 elements: 1)What are the similarities and differences between symmetric and asymmetric cryptography? 2)Provide and explain 3 main uses of asymmetric cryptography. The body of your paper must be between 1 to 2 pages in length and follow the requirements described in the “Format and Organization” guide. That means include all the typical elements such as a title page, table of contents and reference section. You must include at least 2 reference sources. Remember to cite your sources using the proper APA style.
Subject Area: Technology
Document Type: Reports