Discuss the encryption strength of symmetric and asymmetric encryption.

What will be an ideal response?

The power of a particular encryption technique is based on the encryption strength. For a symmetric algorithm the strength is based on the size of its key and the type of algorithm used to perform the encryption. For an asymmetric encryption algorithm, the strength is typically based on the size of the prime numbers used to create the key pair, based on a special mathematical formula.

Computer Science & Information Technology

You might also like to view...

The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database

Indicate whether the statement is true or false

Computer Science & Information Technology

The Office of the National Coordinator for HIT is responsible for administering Medicare and Medicaid

Indicate whether the statement is true or false

Computer Science & Information Technology