Cryptography, Malicious Activity, and Network Security

In a 3 to 5-page paper, identify and explain what symmetric and asymmetric key encryption are and how they differ. In addition to this name and describe some encryption programs used today such as RSA, IDEA, and PGP, and complete the assessment by providing the correct encryption program with the following scenarios.

Name the encryption key program used for each of the below scenarios.

Don't use plagiarized sources. Get Your Custom Essay on
Cryptography, Malicious Activity, and Network Security
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

Scenario 1. Bob sends Alice a message using an encryption key program that will both encrypt and decrypt a message. It will also allow both Bob and Alice to decrypt any message as both know the secret key being used for the encryption process. What is the name of this encryption program and is it safe or not safe to use and why?
Scenario 2. Bob sends Alice a message using an encryption key program that allows him to send an encrypted message using her public key but only Alice can decrypt the message with her private key. What is the name of this encryption program and is it safe or not safe to use and why?
Scenario 3. Alice wants to ensure that her work associates can encrypt any emails they send to her which contains sensitive information. Once she receives any of these emails she can use her private key to decrypt them. What is the name of this encryption program and is it safe or not safe to use and why?

Homework Sharks
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.

Free Revisions

All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.

Title-page

A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.

Bibliography

Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.

Originality & Security

At Homework Sharks, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.

24/7 Customer Support

Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

We work around the clock to see best customer experience.

Pricing

Flexible Pricing

Our prces are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.

Communication

Admission help & Client-Writer Contact

When you need to elaborate something further to your writer, we provide that button.

Deadlines

Paper Submission

We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.

Reviews

Customer Feedback

Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.