Protecting secure information has a long history as chronicled in the text. Two popularly used encryption methods for protecting sensitive data are symmetric and asymmetric (aka public-key) encryption. As noted in your text “The strength of many encryption applications and cryptosystems is determined by key size. All other things being equal, the length of the key directly affects the strength of the encryption.” <
<
(Whitman 494)<
<
Encryption keys are generated by different types of algorithms most commonly patented by RSA Data Security which is based on factoring large numbers, (see link below).<
<
Directions<
<
Using the text, web research and review of the videos below, prepare a 5 page executive summary, exclusive of title and reference pages that:<
<
Briefly defines and explains the fundamental difference between symmetric and asymmetric (aka public-key) encryption, their advantages and disadvantages,<
<
Explains why quantum computing is particularly good at cracking password protected encrypted data. (Hint encryption algorithms are based on factoring large numbers). <
<
https://privacycanada.net/mathematics/prime-factorization/<

For This or a Similar Paper Click Here To Order Now