Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Solution for ABC Institute of Research and XYZ Inc Essay Example

Show related essays

Solution for ABC Institute of Research and XYZ Inc

This is a preview of the 4-page document
Read full text

Solution for ABC Institute of Research and XYZ Inc. Any transfer of sensitive data between the two organizations regarding the research on genetics must be encoded by the sender and decoded at the recipient’s end. ABC Institute and XYZ inc. should both have their private keys safe with them and the public keys were given to each other. On transfer, the data should be encrypted using the public key and then decoded using the matching private key by the recipient.
If the data is not being transferred, it is still desirable that ABC Institute stores the data in an encrypted form so that unauthorized personnel in the company or illegal access through hacking can be prevented. This could be done by giving access to the private key to only those personnel who are authorized to view or change the data.

Both approaches have their advantages and disadvantages. Obvious advantages of symmetric encryption are fast speed and simplicity. There is a much simpler algorithm for the process and the program is less complex also. This means that it takes less of CPU time to execute and proves to be the more viable option when very frequent transfers of data are being done with relatively lesser need for security. (Clercg, 2006)
However, Symmetric encryption is less secure and less reliable compared to the Asymmetric encryption. Because the entire encoding and decoding are done through one key, it is prone to be easily cracked by “brute force” attack, in which all possible keys are tested until the one that works is determined (Clercg, 2006). Besides that, more managing is required to ensure safety in the transfer of the file and key e.g. a secret channel is set up to transfer the secret key (Clercg, 2006).
Asymmetric encryption has many advantages over Symmetric encryption. Firstly, no secret channel is required to send the public key so less management is needed. Secondly, it offers a much higher level of security and privacy and it is much more difficult to crack.  
  . Solution for ABC Institute of Research and XYZ Inc.

This is a preview of the 4-page document
Open full text


Brandt, A., & Krasne, A. (2000, February 14). How It Works: Encryption. Retrieved

November 21, 2009, from PC World: http://www.pcworld.com/article/15230/how_it_works_encryption.html

Clercg, J. D. (2006, October 16). Symmetric vs. Asymmetric Ciphers. Retrieved

November 21, 2009, from Windows IT Pro: http://windowsitpro.com/articles/articleid/93787/Symmetric_vs_Asymmetric_Ciphers.html

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Technology, Military
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire a Writer
preview essay on Solution for ABC Institute of Research and XYZ Inc
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us