Compare and contrast symmetric encryption with public-key encryption, including the strengths and weaknesses of each

What will be an ideal response?

Scalability: with public-key encryption, multiple users can send encrypted mes
sages to Alice using her public key and these messages can be decrypted only by Alice;
thus, a linear number of public-private key pairs need to be established, distributed and
protected to allow pairwise confidential communication between any two users; instead,
symmetric encryption requires a quadratic number of secret keys. Efficiency: existing sym
metric encryption methods are much faster and use much shorter keys than existing public
key encryption methods. Usability: symmetric-key encryption is easier to understand by
an non-expert than public-key encryption.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a rule for using an Append query?

A) All the normal rules for adding a new record to the destination table still apply. B) The destination table should not have an AutoNumber field. C) Data types in both tables much match (with some exceptions). D) There must be the same number of fields in both tables.

Computer Science & Information Technology

A __________ is a file of indexes to the other files it points to.

a. file table b. directory c. page table d. segment table

Computer Science & Information Technology