Thursday, September 12, 2019
Advantages and disadvantages of the commercial use of strong Essay
Advantages and disadvantages of the commercial use of strong cryptographic products - Essay Example Private keys are not supposed to be revealed or transmitted to any other individual. On the other hand, secret-key systems have to be transmitted through a communication channel or manually since the same key used for decryption is also used for encryption. In this case, the might be serious threat of an enemy discovering the secret key when it is being transmitted (Guo and Jin 2011). In addition public-key systems can provide signatures digitally thus preventing repudiation. During authentication through secret-key systems, there is the need of sharing secrets and in other cases it requires the involvement of a third party. This third party can go against the other members and repudiate a message that was previously authenticated and claim the shared secret was compromised. For example, a company may involve a central database that keeps copies in its secret-key system authentication. If this central database is attacked, a widespread forgery on the product of this company would occur. Public-key authentication can prevent this forgery and secure the products of the company. Cryptography has the disadvantage of speed during encryption. Some encryptions methods are faster than others but they take time to encrypt. In order to maximally reduce the time used during encryption, it is advisable to combine several methods to obtain security advantages and speed. This is done by using public-key systems together with secret-key systems. Public key-systems have the advantage of security while secret key systems have the advantage of speed. This protocol is normally referred to as digital envelope (Mollin 2001). The creation of the code used in the encryption and decryption process takes time. For one to figure out the best code to use they have to be an expert in that field and at the same time is patient. This makes the process of make the process of cryptography a hectic and tiring one. In the past sending a code from one person
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.