Electronic key exchange is when “Public key, the slower protocol, is used to exchange the private key, and then the communication uses the faster symmetric key protocol”. This system is generally preferred to keep information confidential because of the difficulty it is to break the encryption of the asymmetric key. This basically takes the advantages of both systems by using the security of asymmetric in the digital signature which protects the relative security, but faster encryption, of symmetric encryption. Asymmetric encryption is necessary for the key exchange because symmetric encryption alone is not entirely secure. Microsoft explains “The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message”. In electronic key exchange, you eliminate this problem by using asymmetric encryption to protect the transmission of this vital
Electronic key exchange is when “Public key, the slower protocol, is used to exchange the private key, and then the communication uses the faster symmetric key protocol”. This system is generally preferred to keep information confidential because of the difficulty it is to break the encryption of the asymmetric key. This basically takes the advantages of both systems by using the security of asymmetric in the digital signature which protects the relative security, but faster encryption, of symmetric encryption. Asymmetric encryption is necessary for the key exchange because symmetric encryption alone is not entirely secure. Microsoft explains “The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message”. In electronic key exchange, you eliminate this problem by using asymmetric encryption to protect the transmission of this vital