Sherrie Brown
DeVry University
It is our understanding that your institution has completed a recent collaboration. While each establishment handles immensely sensitive information, it is to your best interest to utilize the most current cryptology that technology offers. In consideration of the nature of the respected material I suggest your Chief Information Officer fervently consider implementing Symmetric Encryption.
Symmetric Encryption is the oldest and best known encryption device/technique. The method contains a secret key which can be a series of random letters, a name, number, or even a word which is applied to the text portion of a message in order to change the content in a particular way.
The content may be altered in a way that could be as simple as rearranging the text by shifting each letter by a number of places in the alphabet. With this method, the sender and the recipient must know the secret key. This ensures their ability to encrypt and decrypt all messages that use this key and is generally faster.
The algorithms associated with this technique are considered extremely secure and is adopted by the Advance Encryption Standard (AES) with whom the United States Government utilizes to store classified and top-secret files and information.
There is one weakness in the symmetric encryption program and that is, a single key must positively be shared, which presents a prime opportunity for it to be leaked or stolen.
Overall, the symmetric encryption technique is less costly to implement and is the most secure encryption method to date. Please consider carefully the outlined advantages for this method. I encourage further investigation of the attributes pertaining to utilization of symmetric encryption prior to importing this system.
References
Conklin, Wm. Arthur (William Arthur) (2010), Principles of Computer Security : CompTIA Security+ and Beyond. New York, NY: McGraw, Hill Publishers.
References: Conklin, Wm. Arthur (William Arthur) (2010), Principles of Computer Security : CompTIA Security+ and Beyond. New York, NY: McGraw, Hill Publishers. (http://support.microsoft.com/kb/246071) ( http://www.wisegeek.org/what-is-an-encryption-key.htm)