Why would you use symmetric encryption instead of asymmetric one?

Let’s learn why would you use symmetric encryption instead of asymmetric one. The most accurate or helpful solution is served by Quora.

There are ten answers to this question.

Best solution

Key Management: Why would use of publicly-available electronic documents as one-time pads not provide essentially unbreakable encryption?

As I understand it, one-time pads are still considered to provide essentially unbreakable encryption.  Originally, they consisted of physical pads of random characters two copies of which were made, one for each of two parties who wanted to communicate...

Answer:

Part of the security of the OTP is that the you take the plain text and xor it with a random key.  NYT...

Read more

Bill Broadley at Quora Mark as irrelevant Undo

Other solutions

Answer:

ZixCorp is a top rated email encryption service. InviziVault 1, IronPort or Private Notepad are top...

Read more

Michael A. at ChaCha Mark as irrelevant Undo

Single device encryption - is sounds like a SHAm.

Help me understand how encryption works when there's just one device involved. Okay, I think I finally understand at a high level how public key encryption works: each side generates a public/private key pair, sends the public key to the other party...

Answer:

an attacker could just generate all the keys for passwords up to 20 characters in lengthThere are over...

Read more

Tehhund at Ask.Metafilter.Com Mark as irrelevant Undo

Encryption Domain Alternative?

We are currently switching hosting providers and setting up tunnels between our client sites and our new hosting provider. Our new hosting provider recommended using encryption domains to limit the access of the tunnel, and we decided to give it a try...

Answer:

I am not sure what the "encryption domain" is, but I can tell you that I have a nest of different...

Read more

shahaly at Yahoo! Answers Mark as irrelevant Undo

OpenSSL instead of PGP for message signing and encryption? Really?

Over the last several years, I've seen more developers use openssl for file and message signing and encryption, where in the past we would have used PGP/gnupg/OpenPGP.  Is this wise, is it essentially throwing away the work that went into the PGP web...

Answer:

OpenSSL is a perfectly acceptable solution to this problem.  PGP is designed for encrypting and signing...

Read more

Michael Hamburg at Quora Mark as irrelevant Undo

What is the easiest way to use AES-NI hardware encryption in application code on a Linux or BSD system?

If I look at OpenSSL, I see that there are aesni_xts_encrypt () and aesni_set_encrypt_key () methods, although those may be internal methods.  Also I write code that uses AES_bi_ige_encrypt () (which is a different mode, I know, but it shows that I can...

Answer:

As of early 2015, the easiest way to use hardware acceleration is by using OpenSSL's high level crypto...

Read more

Fernando Montenegro at Quora Mark as irrelevant Undo

How does one prove the security of consecutive encryption algorithms?

If P is the plaintext, R is random data as long as the plaintext, and E1 and E2 are different encryption algorithms with independently chosen keys and IVs, my intuition says that:     C = E1 (R) || E2 (R xor P) (with || designating an append) is secure...

Answer:

"Encryption algorithm" is fairly broad.  Most algorithms are designed so that (if they aren...

Read more

Michael Hamburg at Quora Mark as irrelevant Undo

Cryptography: What are the best strategies to store a encryption key on the computer?

I am developing a side project for supporting data encryption on Linux platform. My code encrypts the files using AES256CBC. (I am using OpenSSL Crypto API). The user can encrypt the files and at some later time can decrypt the files. An AES key is generated...

Answer:

While this might not answer your question, I just thought I'd share something I came across. In ARM...

Read more

Sailesh Mukil at Quora Mark as irrelevant Undo

Are there any computer hard drives with built-in encryption?

I'm aware of many drives which claim to offer encryption, but I am referring to verifiable strong encryption, not just password protection. Probably requires a master key, encrypted with a user supplied password, used to encrypt all the data written...

Answer:

Yes, any drive advertised as FDE (full disk encryption) or SED (self-encrypting drive) or as supporting...

Read more

Yi-Nan Zhang at Quora Mark as irrelevant Undo

One-Time Cloud Backup of Archives

Help me do a one-time "cloud" back-up of archived text files and stuff in order to supplement my Time Machine backup. I use a Mac. I'm protected against disk failure via Time Machine. But that won't protect me against a house fire, robbery...

Answer:

Dolly Drive is a cloud-based Time Machine compatible backup service. For $50 they will FedEx you a drive...

Read more

Quisp Lover at Ask.Metafilter.Com Mark as irrelevant Undo

Just Added Q & A:

Find solution

For every problem there is a solution! Proved by Solucija.

  • Got an issue and looking for advice?

  • Ask Solucija to search every corner of the Web for help.

  • Get workable solutions and helpful tips in a moment.

Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.