Cryptography can be simple described as “a technique of encoding and decoding messages, so that they cannot be understood by anybody except the sender and the intended recipient” (Godbole & Kahate, 2003). Symmetric and asymmetric encryptions are the two major technologies used by contemporary organizations to secure their data; hence offering particular advantages when compared. In symmetric key cryptography, encryption and decryption are executed using a similar key whereas two different keys are used for the mentioned purposes in asymmetric key cryptography. The encryption/decryption speed in symmetric key cryptography is considerably faster than that in asymmetric key cryptography. In comparison, the encryption process in symmetric key cryptography is less complex and intricate.
Even though asymmetric key cryptography is less preferred due to the employment of complex algorithms, it needs to be mentioned that organizations today tend to employ both cryptography ways. In fact, hybrid cryptosystems - an amalgamation of asymmetric and symmetric key encryption, is employed for the provision of protected file transference. Whereas file encryptions are made securer and faster by symmetric keys, the key distribution and authentication process is simplified with the incorporation of asymmetric keys (Ariwa & El-Qawasmeh, 2011). The whole process is carried out for the perseverance of data confidentiality during file transfer.
As far as my opinion is concerned, I believe that cryptography should be an indispensable part of every email security strategy in every organization. This is because no organization in the contemporary times is invulnerable to the security breach threats. For the same reason, the implementation of data encryption may turn out to be the foremost protection layer that could not only safeguard the confidential information but also maintains the reputation of the organization.
References
Ariwa, E., & El-Qawasmeh, E. (2011). Digital Enterprise and Information Systems: International Conference, DEIS 2011, London, UK July 20-22, 2011, proceedings. Heidelberg: Springer-Verlag.
Godbole, A. S., & Kahate, A. (2003). Web Technologies: TCP/IP to Internet Application Architectures. New Delhi: Tata McGraw-Hill.