Question 2 Process and technology for setting up a secure communication session between the main office and a remote office using both symmetric and asymmetric methods.
Symmetric and asymmetric methods are methods that employ the use of symmetric and asymmetric keys for encryption and decryption. Symmetric keys are more classified though the keys are allocated with the users that require them, and they both share the key. Mass encryptions use symmetric keys, for they have the most history in file transfer and offer confidentiality to the users. An asymmetric key is the most used key, for it uses a separate key for decryption and encryption. Anyone can use the encryption key in asymmetric while the decryption key is private; hence only the receiver can decrypt the message. When the two methods are used together, symmetric and asymmetric methods, the communication session becomes secure.
When symmetric keys are used alone, they are weak, for, with time, one cannot tell where the original message came from. The reason for the weakness is due to the broad masses that the symmetric key accommodates; hence a key can be circulated a lot and end up not being trackable, and the private key has to be with a large number of people. The strength of the symmetric key is that it provides high speed. The asymmetric key has more advantages compared to weaknesses. Asymmetric keys grant one the ability to provide integrity, authentication and non-repudiation, unlike symmetric keys.
When used together, asymmetric and symmetric keys, they strengthen each other and provide a safe and fast communication process. The two should offer a safe, secure communication session between the main office and remote office, for they will make communication quick, reliable and confidential since decryption requires a private key.