Discuss the encryption strength of symmetric and asymmetric encryption.
What will be an ideal response?
The power of a particular encryption technique is based on the encryption strength. For a symmetric algorithm the strength is based on the size of its key and the type of algorithm used to perform the encryption. For an asymmetric encryption algorithm, the strength is typically based on the size of the prime numbers used to create the key pair, based on a special mathematical formula.
Computer Science & Information Technology
You might also like to view...
The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database
Indicate whether the statement is true or false
Computer Science & Information Technology
The Office of the National Coordinator for HIT is responsible for administering Medicare and Medicaid
Indicate whether the statement is true or false
Computer Science & Information Technology