Prompt: In response to your peers, select one of the situations described by a p
Prompt: In response to your peers, select one of the situations described by a peer and think about a way that you could increase the overall security measures of the situation. Use a systems thinking approach, and think outside of the box!
PEER POST # 1
Symmetric encryption requires less computational complexity, it uses one key to encrypt and decrypt and the key is shorter in length as compared to asymmetric encryption. This makes symmetric encryption the most efficient and reliable option for large transfers of data such as emails, files, securing communication through closed systems and VPN’s. It’s also widely compatible with most hardware and software. Asymmetric encryption utilizes two keys, one public to encrypt and the other private to decrypt. This can slow down efficiency due to the use of more than one key but is considered more secure for that very reason. Asymmetric encryption is best suited for applications such as block chain transactions, banking, digital signatures and authentication. However, it is more practical to use both, the data or message can be encrypted with symmetric encryption while the session key or signature can be encrypted with asymmetric. PEER POST # 2
Symmetric encryption utilizes a single key for process of decryption and encryption. Symmetric encryption is said to be faster for both encryption and decryption as only one key is utilized, this allows for this process to be both fast and efficient. A situation where this is most appropriately used is when sending data over a secure network within a corporation. This allows for larger amounts of data to be transmitted not only faster but also strong security as they within their own network. Asymmetric encryption utilizes two keys, one for the process of decryption, and one for the process of encryption. With speed in mind asymmetric encryption is obviously slower and not as efficient. Asymmetric encryption does however offer greater security as it has both a public key for encryption and a private key for decryption. This would more appropriately be used when sending an email or signing a document as it assists the the verification of identity.