Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

If you compare the advantages and disadvantages of symmetric key cryptography and asymmetric key cryptography based only on the number of keys each mechanism needs

If you compare the advantages and disadvantages of symmetric key cryptography and asymmetric key cryptography based only on the number of keys each mechanism needs to create. The less the better.
Under what condition, symmetric key cryptography is better?
Under what condition, asymmetric key cryptography is better?
Under what condition, they are tie?
What you need to find out are
The range of the number of users when symmetric key cryptography is better than asymmetric key cryptography.
The range of the number of users when symmetric key cryptography is worse than asymmetric key cryptography.
The range of the number of users when symmetric key cryptography is as good as asymmetric key cryptography .Links to an external site.
Your answer will looks like this
200< N <300 symmetric key cryptography is as good as asym
N <=200 symmetric key cryptography is better
300<= N asymmetric key cryptography is better
Note: - N represents number of users.
- This answer is an example, it is not the correct answer,
You can figure out the answers by first figuring out the formulas for
Number_of_keys=f(N)
Thus,
How many keys are required for N number of users if symmetric key cryptography is used?
How many keys are required for N number of users if asymmetric key cryptography is used?
Comparing the formulas, you will be able to figure out the answers.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

2nd Edition

1597499471, 978-1597499477

More Books

Students also viewed these Databases questions