preview

Symmetric And Asymmetric Encryption ( Ian Pierre Gomes Santos

Better Essays

Symmetric and Asymmetric Encryption
Ian Pierre Gomes Santos

1. Introduction

When it comes to information and about this concept related to the digital medium, particularly in the use of public computer networks like the Internet, various services relevant to human’s credibility in computing systems are performed. In fact, they are really important in the fundamentals of security information that are defined by the availability, integrity, confidentiality, authentication, non-repudiation, and finally authorization, which should be free and readily apparent understanding when performing computational transactions:

• Availability - ensuring that information is available for the desired access point.
• Integrity - ensuring that the …show more content…

Thus, it is essential that computational techniques are performed so that the requirements of information protection are met. In this scenario are presented the two basic types of encryption, symmetric or private key and public key or asymmetric.

2. Symmetric or Private Key Encryption
The oldest cryptography model, where the key,the element that gives access to the hidden message exchanged between sender and recipient is equal (symmetric) for both of them and should remain secret (private). Typically, this key is represented by a password, used by both the sender to encrypt the message and the recipient to decrypt it.
Essentially, when the sender encrypts a message, it uses a cipher algorithm to convert the plain text of the message into cipher text. When the destination deciphers a message, it uses the corresponding deciphering algorithm to convert the cipher text back into a clear message. If an intruder knows the cipher algorithm, s/he could just decipher an encrypted message as easily as the destination. The solution in the use of private key encryption proposes that when the sender encrypts a message,

Get Access