Keys distribution in each technique

Symmetric-key:
It only needs one key to encrypt and decrypt the message. Both user should agree or exchange the same key.

Asymmetric-key:
Two different keys required :- public key and private key. Everyone can see the public key and only the one who has private key can decode the message.

How to crack a cipher text encrypted with each algorithm in each technique

Symmetric-key:
In this system, only one key is needed, in order to decode the message, you only need the key. Or you can identify the pattern how they the encryption is done.

E.g : the encoded message is “jgnnq” and you can probably guess that the real message is “hello” by moving each letter to the prior letter. (Probably need to try out every single possiblilty.)

Asymmetric-key:
It is like double encryption. First, the user use receivers public key to encrypt the message, although everyone knows and can see the message, only the person with his own private key can decode the message. So,To decode the system or message, the person’s private key is needed, or need to identify how the private key is created. It is almost impossible to crack the system because the size of the key is too big.

To confirm a sender’s identity in each technique.

Symmetric-key:
This technique confirms sender’s identity by finding who can encrypt the message or decode the message.

Asymmetric-key:
This technique confirms the sender’s identity by the encryption. One person encrypt the message with his private key, and send that with public key (Digital Signature).

The strengths and weaknesses of each techniques

symmetric-key:

  • Strength
    Safer (ample of probability), and faster.
  • Weaknesses
    Key Distribution and Agreement

asymmetric-key:

  • Strength:
    Allow letting other people read the encrypted message. No problem of Key distribution.
  • Weaknesses
    Slow process and Big.

 

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

©2018 MYBSCIT.com. An initiative by some failures to make student scholars.

or

Log in with your credentials

Forgot your details?