Compare symmetric key algorithms with public key algorithms. What are the benefits/drawbacks of each type of algo- rithm? How are these differences manifested in the real world uses of these two types of algorithms?

What will be an ideal response?

In symmetric-key encryption, the same key is used to both encrypt and decrypt a message. Public-key cryptography
is an asymmetric encryption method. It uses two inversely-related keys to encrypt and decrypt a message.

The benefit of using symmetric-key cryptography is that it takes less computing time and power than public-key encryp-
tion and that new keys can be used for each communication session. However, symmetric-key cryptography creates key

management problems, as there are more keys that need to be kept secret, and key distribution problems, as distributing
keys securely so they are not compromised can be difficult. An additional drawback is that there is no way to authenticate
each party in the transaction, since both the sender and the receiver use the same secret key, .
The benefit of public-key cryptography is that each person only needs one key pair, with a private key that is kept secret
and a public key that is published. As a result, each person only needs to protect the privacy of one key—their private key.
Thus, there is less of a key management burden. Public-key cryptography (and the use of digital signatures) allows for
authentication of both parties in a transaction. The drawback of public-key cryptography is that it takes more computing
time and power to process than symmetric key cryptography. Therefore, public-key cryptography is often used to securely
exchange secret symmetric keys for a communication session.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Indexed A. The default field for sorting a table II. Primary key B. A property that creates a second and more efficient table III. Relationship that is quickly searched or sorted IV. Referential integrity C. The rules used maintain valid data in a relationship when V. Foreign key records are entered, edited, or deleted D. The related field in the second table in a relationship E. An association between two tables that is created by using a field common to both tables

Computer Science & Information Technology

An area of memory reserved to temporarily hold selections that have been cut or copied from a document is known as the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology