Solution:Name Activity or Definition Lesser amount of the funds required At the time of initiation of project Maximum funds required Middle of the project, Bulk of the activity developed, Defined in phased Placed in life cycle Lesser amount of the funds required At the time of near to complete the project, Unique in Nature, Required limited time scale, Have special purpose Project Lahore to Islamabad motorway Project Overhead bridge Project Underpass to link Road A to Road B Project Control Traffic flow in Lahore Program Design to achieve a strategic business objective Program Provision of faster, save, secure and international traffic facility in Pakistan
CS204 GDB1 Solution and discussion
Graded Discussion Board
Semester: Spring 2019
Cyber Law – CS204
Let us consider that a security company has around 400 employees exchanging valuable sensitive information everyday through internet between offices stationed at Karachi and Islamabad.
Mohammad Ali is an IT Manager who oversees the overall IT infrastructure and is responsible for implementing the security measures and policies to guarantee the delivery of the messages safely so that no one can breach the confidential information.
To achieve Privacy and high security normally the information is encrypted using symmetric and asymmetric encryptions, however there are some advantages and disadvantages of using both techniques in the above scenario.
Point of Discussion:
If you are asked to choose the best encryption technique (i.e. Symmetric or asymmetric) in the above scenario then what will be your choice? Support your answer with solid reasons considering the pros and cons of both techniques.
Best of Luck !
Actually, it’s difficult to compare the cryptographic strengths of symmetric and asymmetric key encryptions. Even though asymmetric key lengths are generally much longer (e.g. 1024 and 2048) than symmetric key lengths (e.g. 128 and 256), it doesn’t, for example, necessarily follow that a file encrypted with a 2048-bit RSA key (an asymmetric key) is already tougher to crack than a file encrypted with a 256-bit AES key (a symmetric key).
Instead, it would be more appropriate to compare asymmetric and symmetric encryptions on the basis of two properties:
Their computational requirements, and
Their ease of distribution
Symmetric key encryption doesn’t require as many CPU cycles as asymmetric key encryption, so you can say it’s generally faster. Thus, when it comes to speed, symmetric trumps asymmetric. However, symmetric keys have a major disadvantage especially if you’re going to use them for securing file transfers.
Because the same key has to be used for encryption and decryption, you will need to find a way to get the key to your recipient if he doesn’t have it yet. Otherwise, your recipient won’t be able to decrypt the files you send him. However way you do it, it has to be done in a secure manner or else anyone who gets a hold of that key can simply intercept your encrypted file and decrypt it with the key.
The issue of key distribution becomes even more pronounced in a file transfer environment, which can involve a large number of users and likely distributed over a vast geographical area. Some users, most of whom you may never have met, might even be located halfway around the world. Distributing a symmetric key in a secure manner to each of these users would be nearly impossible.
Asymmetric key encryption doesn’t have this problem. For as long as you keep your private key secret, no one would be able to decrypt your encrypted file. So you can easily distribute the corresponding public key without worrying about who gets a hold of it (well, actually, there are spoofing attacks on public keys but that’s for another story). Anyone who holds a copy of that public key can encrypt a file prior to uploading to your server. Then once the file gets uploaded, you can decrypt it with your private key.
When it comes to encryption, the latest schemes may necessarily the best fit. You should always use the encryption algorithm that is right for the task at hand. In fact, as cryptography takes a new shift, new algorithms are being developed in a bid to catch up with the eavesdroppers and secure information to enhance confidentiality. Hackers are bound to make it tough for experts in the coming years, thus expect more from the cryptographic community!
Difference Between Symmetric and Asymmetric Encryption
Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
Symmetric encryption is an old technique while asymmetric encryption is relatively new.
Asymmetric encryption was introduced to complement the inherent problem of the need to share the key in symmetrical encryption model, eliminating the need to share the key by using a pair of public-private keys.
Asymmetric encryption takes relatively more time than the symmetric encryption.
Khuram Shahzad last edited by
File transfer systems normally use hybrid cryptosystems, i.e. a combination of symmetric and asymmetric key encryption, to provide secure file transfers. Symmetric keys facilitate faster file encryptions, while asymmetric keys simplify the key distribution process.
CS606 Assignment 3 Solution and Discussion
CS606 - Compiler Construction48
MTH603 Quiz 1 Solution and Discussion
MTH603 - Numerical Analysis29
CS508 Quiz 2 Solution and Discussion
CS508 - Modern Programming Languages20
ENG101 Assignment 2 Solution and Discussion
ENG101 - English Comprehension10
MTH603 Quiz 2 Solution and Discussion
MTH603 - Numerical Analysis9
PSY610 Assignment 2 Solution and Discussion
PSY610 - Neurological Bases of Behaviour8
CS431 Assignment 3 Solution and Discussion
CS431 - Wireless Communication8
CS314 Assignment 3 Solution and Discussion
CS314 - Introduction to Cellular Networks6
CS315 Assignment 2 Solution and Discussion
CS315 - Network Security6
EDU431 Assignment 3 Solution and Discussion
EDU431 - Test Development & Evaluation5
SOLVED SOC101 Assignment 1 Solution and Discussion
SOC101 - Introduction to Sociology5
CS315 Assignment 3 Solution and Discussion
CS315 - Network Security5
BT603 Assignment 2 Solution and Discussion
BT603 - Fermentation Technology5
VULMS not working ! How to do
CS507 Assignment 3 Solution and Discussion
CS507 - Information Systems4
PAK301 Assignment 2 Solution and Discussion
PAK301 - Pakistan Studies4
ENG505 Assignmnet 2 Solution and Discussion
ENG505 - Language Learning Theories4
EDU411 Assignment 2 Solution and Discussion
EDU411 - Teaching of Urdu4
CS311 Assignment 3 Solution and Discussion
CS311 - Introduction to Web Services Development4
ENG301 Assignment 2 Solution and Discussion
ENG301 - Business Communication4