MS 2

Focus on deep analysis OF asymmetric and symmetric encryption & analyze them.  Evaluate the differences between the two of them and which one that you would determine is the most secure. 

Algorithms from :

  • Design: the foundation of the design from mathematic, tables      generated, static tables, feedback functions 
  • Complexity
  • The use of the algorithms

Note:

2 pages, four scholarly articles and properly APA formatted