Question

You are the CIO for a mid-sized financial company, 5000 employees. You are reviewing your options...

You are the CIO for a mid-sized financial company, 5000 employees. You are reviewing your options to determine whether to select Symmetric Key or Asymmetric Key cryptography. Either approach will satisfy the company’s security requirements. Identify the (5) advantages and (5) disadvantages for each, and the planning considerations. (This question is worth 15 points)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Cryptosystems can be of two types:

  • Asymmetric Cryptosystems
  • Symmetric Cryptosystems

ASYMMETRIC CRYPTOSYSTEMS

In an asymmetric cryptosystem (or public key cryptosystem), there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The keys are generated in such a way that it is impossible to derive the private key from the public key.

ADVANTAGES

  1. It is convenient. Asymmetric encryption solves the problem of distributing keys for encryption, with everyone publishing their public keys, while private keys being kept secret.
  2. It detects tampering. With digital signatures in public key encryption, message recipients can detect if a message was altered in transit.
  3. The primary advantage of public-key cryptography is increased security: the private keys do not ever need to be transmitted or revealed to anyone.
  4. It allows for non-repudiation. Digitally signed messages are like physically signed documents. Basically, it is like acknowledging a message, and therefore, the sender will not be able to deny it.
  5. Maintenance of the keys becomes easy being the keys (public key/private key) remain constant through out the communication depending on the connection.
  6. As the number of keys to be kept secret become less.

DISADVANTAGES

  1. A disadvantage of this type of encryption is speed, there are popular secret-key encryption methods which are significantly faster than any currently available public-key encryption method.
  2. This is not suitable for encryption of large messages as the encryption/decryption throughput is inversely related to the key length.
  3. Its public keys are not authenticated. Basically, no one absolutely knows that a public key belongs to the individual it specifies, which means that users will have to verify that their public keys truly belong to them.
  4. It risks loss of private key, which may be irreparable. When you lose your private key, your received messages will not be decrypted.
  5. It risks widespread security compromise. If your private key is identified by an attacker, all of your messages can be read by him/her.

SYMMETRIC CRYPTOSYSTEMS

A symmetric cryptosystem (or private key cryptosystem) uses only one key for both encryption and decryption of the data. The key used for encryption and decryption is called the private key and only people who are authorized for the ecryption/decryption would know it. In a symmetric cryptosystem, the encrypted message is sent over without any public keys attached to it.

ADVANTAGES

  1. Symmetric key encryption is much faster than asymmetric key encryption.
  2. Encrypt and decrypt your own files: If you use encryption for messages or files which you alone intend to access, there is no need to create different keys. Single-key encryption is best for this.
  3. Single-key encryption does not require a lot of computer resources when compared to public key encryption.
  4. A symmetric cryptosystem uses password authentication to prove the receiver’s identity.
  5. Prevents widespread message security compromise. A different secret key is used for communication with every different party. If a key is compromised, only the messages between a particular pair of sender and receiver are affected. Communications with other people are still secure.
  6. This type of encryption is easy to carry out. All users have to do is specify and share the secret key and then begin to encrypt and decrypt messages.

DISADVANTAGES

  1. Symmetric cryptosystems have a problem of key transportation. The secret key is to be transmitted to the receiving system before the actual message is to be transmitted. Every means of electronic communication is insecure as it is impossible to guarantee that no one will be able to tap communication channels. So the only secure way of exchanging keys would be exchanging them personally.
  2. Origin and authenticity of message cannot be guaranteed by this method. Since both sender and receiver use the same key, messages cannot be verified to have come from a particular user. This may be a problem if there is a dispute.
  3. When someone gets their hands on a symmetric key, they can decrypt everything encrypted with that key thus causing more damage. When you're using symmetric encryption for two-way communications, this means that both sides of the conversation get compromised. With asymmetrical public-key encryption, someone that gets your private key can decrypt messages sent to you, but can't decrypt what you send to the other party, since that is encrypted with a different key pair.
  4. Cannot provide digital signatures that cannot be repudiated.
  5. There is a need for secure channel for secret key exchange. Sharing the secret key in the beginning is a problem in symmetric key encryption. It has to be exchanged in a way that ensures it remains secret.
  6. A new shared key has to be generated for communication with every different party. This creates a problem with managing and ensuring the security of all these keys.

Planning Considerations -

Since an organisation may reasonably want to encrypt and decrypt the same data for years one may consider certain factors like:

  • "amount of information protected by a given key"
  • "amount of exposure if a single key is compromised"
  • "time available for attempts to penetrate physical, procedural, and logical access"
  • "period within which information may be compromised by inadvertent disclosure"
  • "time available for computationally intensive cryptanalytic attacks"

So we should make decisions according to our requirements and also considering their advantages and disadvantages. Ideally, both of them are employed together to take advantage of their benefits

Add a comment
Know the answer?
Add Answer to:
You are the CIO for a mid-sized financial company, 5000 employees. You are reviewing your options...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Gentry Inc. is a mid-sized tech firm (200 employees and $300 million in revenue) and has...

    Gentry Inc. is a mid-sized tech firm (200 employees and $300 million in revenue) and has been privately held since the firm’s inception ten years ago. The organization’s board of directors is keen on expanding the operations globally to take advantage of a growing market. Based on reports from the research and development team, the organization can increase its profitability metrics by 15 to 25% if it expands the operations to China, Japan, and Germany. Becoming a multinational organization will...

  • You have just been hired as the new Director of Human Resources at a mid-sized company...

    You have just been hired as the new Director of Human Resources at a mid-sized company of 48 employees. The company’s name is Florida Wireless, which is an authorized agent for Verizon Wireless. Florida Wireless has 5 retail locations throughout Central Florida. The stores are all very busy. Customer wait times are usually very long. Customer satisfaction surveys indicate poor service. Turnover is high for sales/customer service. Even though the stores are busy, store managers are not making the sales...

  • Amazon to Competition: We Will Crush You! Amazon to Employees: We Will Churn You! Globally, Amazon...

    Amazon to Competition: We Will Crush You! Amazon to Employees: We Will Churn You! Globally, Amazon is one of the largest and most successful companies in any industry. Technological innovation has contributed to its success, as has its employee acquisition practices, which are exceptionally high. The question is what has allowed this company to thrive and maintain its success? This activity is important because it shows how companies like Amazon hire based on personality and individual differences. Such companies place...

  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • 1. find an article about a product or service that impacts your daily life and write...

    1. find an article about a product or service that impacts your daily life and write 1 to 2 paragraphs describing the item, how it impacts your life, and what factors you think are impacting the supply and demand of this item. Be sure to include the URL of the article you accessed for this question. 2.What are the ethics of outsourcing? Is a corporation’s primary responsibility to its stockholders, by reducing labor costs? Or is its primary responsibility to...

  • Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expresse...

    Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expressed by either customers, internal stakeholders, employees, or regulatory authorities. In short, a project is a time bound and specific goal oriented task-system that is born out of an ask from any stakeholder. Project initiation is laying down a new project by defining its goals, objectives,...

  • this is all the information given Personal Financial Planning Mini-Case Jeff and Mary Douglas, a couple...

    this is all the information given Personal Financial Planning Mini-Case Jeff and Mary Douglas, a couple in their mid-30s, have two children - Paul age 6 and Marcy age 7. The Douglas' do not have substantial assets and have not yet reached their peak earning years. Jeff is a general manager of a jewelry manufacturer in Providence, RI while Mary teaches at the local elementary school in the town of Tiverton, RI. The family needs both incomes to meet their...

  • Actions that damage a company and its employees should be stamped out, everyone would agree. But ...

    Actions that damage a company and its employees should be stamped out, everyone would agree. But should the people responsible be stamped out, too? HBR CASE STUDY The Reign of Zero Tolerance by Ben Gerson "Mr. Pemberton?" manager. The guards had radioed her that the "Yes, that's me," Simon replied distractedly, his back turned. target wasn't putting up much resistance. "Your personal belongings will be messen The two burly gentlemen who had suddenly gered to your home later today," Sallie...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT