In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. At first glance, the key wrapping approach to encrypting symmetric keys for key management applications seems unnecessarily elaborate. The alternative would be a simple encryption using AES or an authenticated encryption using one of the block cipher modes of operation that provides authenticated encryption. Discuss the relative merits of using one of these approaches compared to key wrapping.The writing assignment requires a minimum of 800 words.You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
——-
You will examine asymmetric and symmetric encryption in the second milestone writing assignment. Consider the differences between the two and choose the one that you believe is the most secure. The key wrapping strategy to encrypting symmetric keys for key management applications appears overly complicated at first view. Simple encryption with AES or authenticated encryption with one of the block cipher modes of operation that allows authenticated encryption would be an alternative. Compare and contrast the advantages of utilizing one of these methods against key wrapping. A minimum of 800 words is required for the writing assignment. To accomplish the task, you must use at least three research articles. The assignment must be formatted according to APA guidelines, with a separate title page and reference page.