.

Sunday, May 12, 2019

Advantages and disadvantages of the commercial use of strong Essay

Advantages and disadvantages of the commercial use of strong cryptographic products - Essay ExamplePrivate keys are not supposed to be revealed or transmitted to any other individual. On the other hand, mystery story-key schemas have to be transmitted through a communication channel or manually since the comparable key utilise for decryption is also used for encryption. In this case, the might be serious threat of an enemy discovering the secret key when it is being transmitted (Guo and Jin 2011).In addition public-key systems can provide signatures digitally thus interrupting repudiation. During credential through secret-key systems, there is the need of sharing secrets and in other cases it requires the involvement of a ternion party. This third party can go against the other members and repudiate a message that was previously authenticated and seize the shared secret was compromised. For example, a company may involve a central database that keeps copies in its secret-key system authentication. If this central database is attacked, a widespread forgery on the product of this company would occur. Public-key authentication can prevent this forgery and secure the products of the company.Cryptography has the disadvantage of speed during encryption. Some encryptions methods are faster than others but they piss time to encrypt. In order to maximally reduce the time used during encryption, it is advisable to combine some(prenominal) methods to obtain tribute advantages and speed. This is done by using public-key systems together with secret-key systems. Public key-systems have the advantage of security while secret key systems have the advantage of speed. This protocol is normally referred to as digital envelope (Mollin 2001).The creation of the code used in the encryption and decryption process takes time. For one to figure let out the best code to use they have to be an expert in that field and at the same time is patient. This makes the process of m ake the process of cryptography a hectic and tiring one. In the agone sending a code from one person

No comments:

Post a Comment