Research the following:
Symmetric key vs. Asymmetric key
Public vs. Private
Pre-shared key?
Answer: Which one do you believe is more secure? and why. Are they equally secure? if not explain.
Cryptography: It is a method of using advanced
mathematical principles or algorithms for transmitting data from
sender to receiver securely.
A plain text from a user can be encrypted to a cipher text, then
send through a communication channel and no eavesdropper can
interfere with the plain text. When it reaches the receiver end,
the cipher text is decrypted to the original plain text.
Encryption: It is a process whereby a message is
encoded using encryption algorithm and a key in a format that
cannot be read or understood by an eavesdropper.
Decryption: It is opposite to encryption process ,
means it is a process wherby the encoded message is decoded to plan
text or real message.
Symmetrical Encryption: It involves one secret key
to encrypt and decrypt the information. Symmetrical encryption is
an old and best-known technique. It uses a secret key that can
either be a number, a word or a string of random letters. The most
widely used symmetric algorithm is AES-128, AES-192, and
AES-256.
Asymmetrical Encryption: In this encryption a public key is made freely available to anyone who might want to send you a message. The second private key is kept a secret so that you can only know. Popular asymmetric key encryption algorithm includes EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
Difference between symmetric and asymmetric
encryption:
Symmetric encryption uses a single key while asymmetrical
encryption uses a pair of public key and a private key to encrypt
and decrypt messages.
Symmetric encryption is an old technique while asymmetric
encryption is relatively new.
Asymmetric encryption takes relatively more time than the symmetric
encryption.
Symmetric vs Asymmetric key:
As we seen that in symmetric cryptography same secret key
is used for encryption and decryption. Its a old
technique and less secure.
Whereas in asymmetric cryptography different keys like
message is encrypted by public key and decrypted by secret
key. Its a new technique and more secure than
symmetric.
Private and Public key: These are also similar to symmetric (private key) vs asymmetric one(public and private key combination).
Pre-Shared Key(PSK) : It can be thought of as a password that is shared with all parties using encryption to communicate. The PSK is the “password” used to encrypt / decrypt; in encryption such a “password” is called a key. The idea is that before communicating, the encryption key must be pre-shared with all necessary individuals. Once the password is know by undesired person the he can misutilised this key whenever he wants.
So as per my knowledge combination of private and public key which are used in Asymmetric cryptography is more secure because in this every time the message is secured with different public key and a secure private key is shared with recipients.
PFA screen shot of flow diagrams of symmetric and asymmetric cryptography.
Research the following: Symmetric key vs. Asymmetric key Public vs. Private Pre-shared key? Answer: Which one...
RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...
1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...
secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...
QUESTION 1 Bob has received Alice's public key. Which one of the following is NOT a step that Bob must take to process her key? O 1. Sign the key 2. Import the key into the WinPT Key Manager 3. Enter his e-mail address O 4. Verify the fingerprint for the key QUESTION 2 Bob has just installed GPG for his operating system. Which one of the following items O 1. His email address O 2. The email address of...
Symmetric key encryption. Suppose (KeyGen,Enc,Dec) is an IND-CPA secure symmetric key en- cryption. We define following new encryption algorithms, are the new schemes still IND-CPA secure? If yes, briefly explain why. If you think it insecure, give an explicit attack violating the IND-CPA definition. Recall that the intuition of IND-CPA security means the ciphertext does not leak any non-trivial information about the plaintext. Enc1(k,m) is defined as follows: It runs Enc(k,m) and obtains c0; then it adds a fixed padding...
Define: 1. Cryptography – asymmetric vs. symmetric, examples of modern cryptographic systems (protocols) use which? 2. Block ciphers – how they work, examples and best uses 3. Encryption vs. Hashing, how they work to together – which areas in the security triad do they satisfy? 4. How do embedded systems affect security? 5. Ethics and white hat hacking 6. Legal/ethical issues with running some tools “in the wild” 7. Role of routers/firewalls in security 8. DMZ role in security 9....
1. Create an RSA private key 2. Output the key in a text format so that it shows the following: modulus public exponent (e) private exponent (d) the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...
Market segmentation and asymmetric information would help explain, which of the following: Select one: a. foreign investors do not have capital to invest b. international investors lack skills to do research c. domestic investors lack skills to do research d. foreign investors lack information about the local markets and firms A Multinational enterprise can ________ its ________ by acquiring access to markets which are less illiquid as well as less segmented than its own. Select one: a. decrease; Marginal Cost...
What are some key identifiers used in health care to determine quality? Explain each one. Which identifier do you believe is most valuable? Why?
What are some key identifiers used in health care to determine quality? Explain each one. Which identifier do you believe is most valuable? Why?