Question Description
I don’t understand this Computer Science question and need help to study.
Answer all questions in a single document

Final Answer

Attached.
Running head: CRYPTOGRAPHY
1
Cryptography
Institution Affiliation
Date
CRYPTOGRAPHY
2
Strengths and weaknesses of symmetric and asymmetric key cryptography
In symmetric key cryptography, both the receiver and the sender share a similar key. The major
strengths of symmetric key cryptography include speed whereby the method allows the encryption of
huge amounts of data in a very short time (Stallings and Tahiliani, 2014). The availability of the
encryption method is also high where the algorithms employed in encoding are available freely and the
method is also extremely secure. Its major weaknesses include limited security whereby it only encodes
data and prevents its accessibility while failing to provide other security elements like authentication.
Its distribution is also limited since a similar key is used in encryption and description. One of the
areas where the symmetric key is used is in the encryption of ATMs. Asymmetr...
