Crypto algorithms (asymmetric or symmetric) Comparison

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics but does not want to share other research projects. These other projects must be kept confidential at any cost. ABC researchers are unsure about the form of crypto algorithm (asymmetric or symmetric) to use to protect their intellectual property. Compare these two forms of cryptography. Formulate a possible solution to the problem and describe the advantages and disadvantages of any solution employed.
Requirements

    This is an individual assignment, i.e. not a team or partner assignment.
    Use a three-paragraph format: an introduction/scenario recap, analysis, and conclusion.
    Provide an APA style reference page with at least two references.
    Double-spaced, font size 10 or 11.
    500 word minimum, not including your name, title, or references.

Order Now

Top