Sec280 Week 3

682 Words3 Pages
Key to Security…show more content…
The key can be changes and unique to each sender and receiver. ("Symmetric encryption,”) states, “There are two types of symmetric algorithms. Stream algorithms (Stream ciphers) and Block algorithms (Block ciphers).” Stream ciphers only encrypt one bit at a time. This can make this cipher faster than block ciphers, but stream ciphers have a security gap that can be harmful for specific types of attacks. These specific attacks can cause information to be compromised. Block ciphers encrypts information in blocks instead of doing it bit by bit. The size of the blocks is usually 64 bits. Triple DES and AES are the most popular symmetric algorithms that use block ciphers. The use of symmetric encryption has several advantages when compared to asymmetric encryption. Symmetric encryption is faster than public key algorithms. (:Symmetric encryption,”) states, “Public key algorithms are very slow, roughly 1,000 times slower than symmetric algorithms. It is impractical to use them to encrypt large amounts of data.” With the volume of data we will be sharing with XYZ Inc., and the time constraints that some of it will hold, using symmetric encryption would be the top choice at this time. It is also not wise to use public key signature algorithms to sign large messages. The use of a fixed length hash would be reasonable. The hash is made of the message

    More about Sec280 Week 3

      Open Document