Preview

Asymmetric and Symmetric Encryption

Good Essays
Open Document
Open Document
1002 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Asymmetric and Symmetric Encryption
Keys to Locking the Door
By:
Course: 280 Principles Info System Security
Professor:

ABC Institute of Research has collaborated with the XYZ Inc. to research genetics. They have highly sensitive information that needs to be protected from their rivals and must be protected. ABC Institute knows how sensitive this information is and have raised several concerns about the security between the two companies. There has been an ongoing debate over which type of security measure should be used to protect the data, asymmetric or symmetric. There are two questions that we need to ask ourselves: is one is better than the other and which one will protect our information to the fullest possible length? Or is there a way to use both types of encryption that would maximize our protection efforts? It’s time to explore our options for keeping our information under lock and key.
To truly be able to decide which encryption type would work best we must first understand how they work and the components that define each. Both asymmetric and symmetric encryption use a key “that is applied to the text of a message to change the content in a particular way” ("Description of symmetric," 2007). Keys can be anything from a random set of letters or numbers to words or a mixture. This is where we, as humans, create our own fault because we often use common patterns for passwords/keys. This allows hackers to create a dictionary of commonly used passwords and preform a dictionary attack on the network.
Symmetric encryption is the process of using a key to turn plain text into ciphertext. Once you have encrypted the text you can send it to the desired receiver. The receiver will have to have the key used to encrypt the text to decrypt the text. For this to happen you must share the key used to encrypt the text with the person/people that will receive the message. A “symmetric key can be changed every time” (Czagan, 2013) someone wants to communicate. Although



References: Czagan, D. (2013, 10 23). Symmetric and asymmetric encryption. Retrieved from http://resources.infosecinstitute.com/symmetric-asymmetric-encryption/ Description of symmetric and asymmetric encryption. (2007, 10 26). Retrieved from http://support.microsoft.com/kb/246071 Miessler, D. (n.d.). The difference between encoding, encryption, and hashing. Retrieved from http://www.danielmiessler.com/study/encoding_encryption_hashing/

You May Also Find These Documents Helpful

  • Better Essays

    KUDLER FINE FOODS

    • 3315 Words
    • 14 Pages

    Our goals subject themselves to technology that are very direct when considering information security, showcasing specific objectives that conforms to a more secure platform that is different, yet similar to what Kudler Fine Foods development team is familiar with; exercising an advanced and cost effective methodology that is needed to efficiently secure data during and after the implementation of its new customer loyalty program. We aim to intelligently convey the vast significance of properly securing sensitive data, the importance of following policies and procedures that conform to security risk and mitigation methods. Our ultimate objective is to put in place a thorough information security system, which substantially and effectively reduces threats and vulnerabilities to all Kudler’s electronic information.…

    • 3315 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Using the table given the encryption strategy for Richmond investments would go as follows. I will be using the privacy or confidentiality objective. The basic description for the privacy or confidentiality objective is to keep information secret from all person or persons, except those who are authorized to see it have access. In other words, no one without authorization will be able to gain access to sensitive company information or client information, such as addresses, names, billing information, credit card information, and other personal information. The security option needs to be implemented on all networks in the company’s domain. The public key infrastructure is a set of hardware, software people policies and procedures needed to create, manage, distribute use store and revoke digital certificates. In this case will be using PKI cards, which will allow entrance into the facility, it will also allow entrance into specific areas of the building, allow employees to clock in and out and will allow for signing off and on of company computers. All employees will be issued a card with their name employee ID and photo on the face the card on the backside of the card will be company contact information such as departmental phone numbers, etc. the implementation of a company encryption strategy is extremely important to protect the company. The company’s clients and the overall day-to-day activities, the employees involved themselves in to keep the company running.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Term Paper Sec 402

    • 1192 Words
    • 5 Pages

    The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 403 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    At Kilgore and Trinity I have had to deal with clients and witnesses. I have to sometimes explain to them the legal process and what is going to be ask of them. You always need to remember this might be the first time someone has been part of a legal process. I see myself as a translator. Sometimes it is explaining the process of a lawsuit or the process of discovery. Sometime it would be to prepare them for a deposition or even testifying at trial.…

    • 86 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Based on the security objectives in the following table, design an enterprise encryption strategy-a public key infrastructure (PKI) that supports internal employees, external business partners, and clients. Include the design and reasoning for using the selected encryption strategy.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Historians say that the New Deal era is the beginning of modern American society. Many also say it was the beginning of the Imperial Presidential era. It was also a time when the quality of life had raised in a time of war. Life expectancy went up three years for whites and five years for blacks. (HIST 222 lecture, 28 OCT 10) There are many reasons why people consider the New Deal era the beginning of modern society, but the new reforms and programs, new women and new Negros, and the new consumer life style are the most evident and important.…

    • 728 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ABSs choice of a solution to the data protection and encryption problem is most likely directly related to the penalties that can be enforced against them for non-compliance of the laws. The Federal Trade Commission, state insurance authorities and other federal regulatory agencies have the power to enforce the Gramm-Leach-Bliley (GLB) Act which requires all financial, investment and insurance agencies to inform their customers of their information sharing procedures. The GLB Act also requires these agencies to safeguard their customer’s sensitive data and information. ABSs solution to safeguard their customer’s data and information is directly related to compliance of the GLB Act.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    LPI

    • 1802 Words
    • 5 Pages

    Based on your profile from the Personal Values Assessment, describe three important values that guide your work and life. Were you surprised by the results? What would you add from your own thoughts about what is important to you as you lead and work?…

    • 1802 Words
    • 5 Pages
    Powerful Essays