Symmetric cryptography, Other Subject

Symmetric Cryptography

Until recently, symmetric encryption techniques were used to secure information transmitted on public networks. Traditional, symmetric cryptographic systems are based on the idea of a shared secret. In such a system, two parties that want to communicate securely first agree in advance on a single "secret key" that allows each party to both encrypt and decrypt messages.

Symmetric cryptography has several drawbacks. Exchanging secret keys is awkward in large networks. Furthermore, the distribution of secret keys requires both senders and recipients to trust, and, therefore, to be recognizable with, every person they communicate with firmly. Also, symmetric systems need a secure channel to deal out the "secret" keys in the first place. If there is certainly such a secure channel, why not use it to send the entire secret message?

In today's Web-based systems concerning many transitory and participant's interactions with strong cryptography necessities, such symmetric key-based systems are highly not practical as a means for approving upon the necessary secrets to begin communicating firmly. This problem, the key contract, or key allocation problem, is part of a larger problem that is middle to the modern understanding of cryptographic systems-the key management problem (described in greater feature later in the chapter). Together, they represent the primary challenge in designing efficient cryptography systems for current computing systems. Symmetric key encryption plays an important role in the SSL protocol, along with asymmetric public key encryption.

Posted Date: 10/12/2012 8:18:02 AM | Location : United States

Related Discussions:- Symmetric cryptography, Assignment Help, Ask Question on Symmetric cryptography, Get Answer, Expert's Help, Symmetric cryptography Discussions

Write discussion on Symmetric cryptography
Your posts are moderated
Related Questions
E-COMMERCE VS E-BUSINESS The Internet economy is a broader idea than e-commerce and e-business. It includes e-commerce and e-business. The CREC (Center for Research and Elec

Question 1: "Public Policy gives one a better understanding of what governments do, why they do what they do and what difference public policy makes to the lives and circumstan

Question 1 What are the indicators of Excellence in Technical Communication? Question 2 What's Audience Analysis? Explain its significance in Technical Communication

Gender in Health and Body: Inequalities between the genders can be seen at many levels. Some of these inequalities are biological in origin, however, the majority of these differe

Question : (i) Outline the main options for trading between businesses and consumers. (ii) Outline the reasons why a business may wish to adopt e-commerce. (iii) De


Environmental Health Issues: A variety of pollutants present in the environment often lead to a pattern associated with the most common environmental health issues facing society.

writing 30 pages for applying E-business concepts and analysis on a website of your choice

Reformat Existing Word Document Project Description: We want a Microsoft Word expert who can take our current Word document template and clean it up so it's user friendly and

needing advice on a topic for a comparison and contrast paper