Symmetric cryptography, Other Subject

Assignment Help:

Symmetric Cryptography

Until recently, symmetric encryption techniques were used to secure information transmitted on public networks. Traditional, symmetric cryptographic systems are based on the idea of a shared secret. In such a system, two parties that want to communicate securely first agree in advance on a single "secret key" that allows each party to both encrypt and decrypt messages.

Symmetric cryptography has several drawbacks. Exchanging secret keys is awkward in large networks. Furthermore, the distribution of secret keys requires both senders and recipients to trust, and, therefore, to be recognizable with, every person they communicate with firmly. Also, symmetric systems need a secure channel to deal out the "secret" keys in the first place. If there is certainly such a secure channel, why not use it to send the entire secret message?

In today's Web-based systems concerning many transitory and participant's interactions with strong cryptography necessities, such symmetric key-based systems are highly not practical as a means for approving upon the necessary secrets to begin communicating firmly. This problem, the key contract, or key allocation problem, is part of a larger problem that is middle to the modern understanding of cryptographic systems-the key management problem (described in greater feature later in the chapter). Together, they represent the primary challenge in designing efficient cryptography systems for current computing systems. Symmetric key encryption plays an important role in the SSL protocol, along with asymmetric public key encryption.


Related Discussions:- Symmetric cryptography

Tissues, which two connective tisssues have a matrix that is fluid?

which two connective tisssues have a matrix that is fluid?

Briefly outline kolhberg''s views on moral education, Problem : (a) Bri...

Problem : (a) Briefly outline Kolhberg's views on Moral education. (b) Explain the concepts of autonomous and heteronomous morality as put forward by Piaget. (c) Support

Theory of moral development, Question 1: a) Briefly describe Carol Gil...

Question 1: a) Briefly describe Carol Gillighan's theory of Moral development. b) Explain the term 'autonomous morality' as put forward by Piaget and is usefulness in clas

Public speaking, Public Speaking : It is the procedure of speaking to a gro...

Public Speaking : It is the procedure of speaking to a group of people in a, deliberate, structured manner intended to inform, influence, or entertain the listeners. It is allied c

Environmental responsibility in business, Environmental Responsibility in B...

Environmental Responsibility in Business: In business there are three sources of environmental responsibilities: those needed by law, those demanded by ethics, and those that prot

Types of urban cultures, Types of urban cultures: The following typology o...

Types of urban cultures: The following typology of urban cultures depends on a conception of cities as centres for the performance of cultural roles found only in state-level soci

Applicability of Factory Act 1948, As">http://www.delhi.gov.in/wps/wcm/conn...

As">http://www.delhi.gov.in/wps/wcm/connect/doit_labour/Labour/Home/Acts+Implemented/Summary+of+the+Acts+Implemented/The+Factories+Act-1948 As per above site of Government of Ind

New Media: Policy and Practice, Do you have solved assignment for unicaf li...

Do you have solved assignment for unicaf liverpool john moores university

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd