Essay questions, computer science homework help

User Generated

terraonol

Writing

Description

Answer all questions in a single document

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CRYPTOGRAPHY

1

Cryptography
Institution Affiliation
Date

CRYPTOGRAPHY

2

Strengths and weaknesses of symmetric and asymmetric key cryptography
In symmetric key cryptography, both the receiver and the sender share a similar key. The major
strengths of symmetric key cryptography include speed whereby the method allows the encryption of
huge amounts of data in a very short time (Stallings and Tahiliani, 2014). The availability of the
encryption method is also high where the algorithms employed in encoding are available freely and the
method is also extremely secure. Its major weaknesses include limited security whereby it only encodes
data and prevents its accessibility while failing to provide other security elements like authentication.
Its distribution is also limited since a similar key is used in encryption and description. One of the
areas where the symmetric key is used is in the encryption of ATMs. Asymmetr...

Related Tags