Computer Science ISSC266 week 2 assignment

 

Instructions

Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Cryptography is divided into two types: Symmetrical and Asymmetrical. Symmetrical cryptography uses a secret key to encrypt data and the same key to decrypt the ciphered data. Asymmetrical cryptography uses a public key to encrypt data and a public key to decrypt data. In this paper, you are going to compare symmetrical and Asymmetrical encryption using common algorithms from each encryption types. Your analysis should focus on speed, key length, and implementation.

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!