Advantages And Disadvantages Of Cryptography Technology

1726 Words4 Pages

The usage of information systems within daily business and personal affairs for the transmission of confidential or even personal identifiable information, requires the usage of such as cryptography technology to secure the information. Three major forms of cryptography for digital transmission and data storage are hybrid, asymmetric, and symmetric cryptography algorithms, that provide security to protect the integrity, confidentiality, reliability, and authenticity of data transmissions and storage. (Rouse, 2008) However, each technology possesses individual traits and characteristics best suited for types of data transmission and storage. As symmetric key uses two identical keys for transmission and decryption, asymmetric employs a private …show more content…

(“Advantages and Disadvantages of Symmetric and Asymmetric Key Encryption Methods”, 2010) An advantage the transfer of keys, all users of asymmetric technology only publish the public-key, while the private key remains secret from general public knowledge. Digital signatures establish the medium for verification of the identity of the message, ensuring the sender is the appropriate personnel or organization. (Lander, n.d.) Additionally, allows the recipient of the digital signed message to verify the authenticity of the message, and the sender is unable to deny the origin of the message. Disadvantage, asymmetric users are required to verify their public authenticity, saying the public key actually belongs to them. Asymmetric encryption relatively slow when compared to other encryption methods like symmetric cryptography, and unsuitable for large file transfers. (“Advantages and Disadvantages of Symmetric and Asymmetric Key Encryption Methods”, 2010) The private key, the only method of asymmetric to decrypt an encrypted message is the through the usage of the private, if the private key no method is possible to decrypt the …show more content…

(Babu, Tianfu, n.d.) The system utilizes the paired key method from asymmetric with one glaring difference, the requirement to secure both the private and public key, to prevent compromise of data. The transferal of data within the system implements elements of session keys associated with symmetric technology, with public-key encryption serving as the decryptor of the symmetric key. (Cobb, 2008) Nevertheless, this addition provides the security feature that symmetric systems lacked to provide, a secure means of transmitting the paired keys from sender and receiver. Additionally, the encrypted symmetric key is the only key capable of decrypting the transmitted message, and the symmetric key is randomly generated so no key to agree upon. (Babu, Tianfu, n.d.) Hybrid cryptography implements two different encryption schemes, a key encapsulation scheme for the public-key, and a data encapsulation scheme for the symmetric

Open Document