I need help creating a thesis and an outline on Asymmetric Key/Symmetric Key. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Encryption Methods A symmetric encryption algorithm is constructed on the foundation of shared key information between the two ends or parties involved in the communication (Misra, Woungang, & Misra, 2009). If the sender utilizes the secret key to encrypt the information or message, the recipient will also use the same key for decrypting the message or information. Symmetric keys have advantages over other encryption techniques, as they are efficient in terms of saving energy (Misra, Woungang, & Misra, 2009). Moreover, symmetric encryption consumes less processing power and is comparatively faster. The size of the encrypted file is equal or less in comparison with the original file size. Furthermore, there are issues associated with key agreement, as they will impact the scalability of networks. In addition, the keys for encryption and decryption cannot be utilized by digital signatures (Symmetric and asymmetric ciphers, n.d.). An asymmetric encryption algorithm utilizes two keys for encrypting and decrypting the information or the message. Accordingly, the process is comparatively slower due to the processing of two keys. Moreover, the size also matters in a limited bandwidth network, as asymmetric encryption constructs larger encrypted file sizes. However, scalability or the increase in users is addressed and has no issues (Symmetric and asymmetric ciphers, n.d.). Furthermore, asymmetric encryption addresses confidentiality issues by encrypting the information and supports integrity and non repudiation by supporting digital signatures (Symmetric and asymmetric ciphers, n.d.). Applying Encryption Methods After discussing the advantages and disadvantages, we will now apply these techniques to the current scenario. ABC institute of research has a collaboration with XYZ inc. for performing research on genetics. The collaboration concludes that a computer network is involved in accessing highly sensitive information. Likewise, to ensure reliable safety, ABC institute of research can implement symmetric key algorithm techniques, as they do not impose high overhead due to single key processing as well as low encrypted file size. However, this method will not address confidentiality, integrity, and non repudiation at the same time. One more solution for addressing all the issues at the same time is to deploy both asymmetric and symmetric algorithm techniques altogether. Both of these techniques will address confidentiality, integrity, and non repudiation. However, before implementing both of these techniques simultaneously, ABC institute of research must ensure following objectives have been achieved: The encryption solution must be secure in every aspect The encryption and decryption process must not take a long time and should not put an overhead on the network. The size of the cipher must be compressed The encryption solution must also address the scalability issues The distribution of the keys must also be addressed Employing Advanced Encryption Techniques ABC institute of research can also incorporate quantum encryption techniques. However, these next generation encryption techniques are still in research and development and are not widely adopted.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more
Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;