Question One
People tasked with developing secure cryptography typically take part in various functions to ensure a secure system is created. They design, analyze, and even attempt to break their cryptographic systems (Mone, 2013). These security experts not only develop encryption algorithms but they also seek ways to bypass these algorithms. This act of breaking and bypassing their cryptographic systems is usually a means of testing to determine areas of vulnerability hence better development. On the other hand, the individuals who strive to break cryptographic systems are often viewed as malicious. This perception is usually due to the large number of such people who on succeeding with their attack on the system, they infringe on other people’s privacy and finances. They normally use technological tools to attack the systems in ways the security experts never imagined. However, such individuals are not always malicious as some, better known as white hackers, break the cryptographic algorithms and inform the relevant organization of the security hole so it can be improved.
Question Two
Symmetric key cryptography involves the use of a shared (same) private key to encrypt as well as decrypt information. This use of the same key makes this type of encryption faster than public key encryption. An example of a real-world application of the symmetric key cryptography is where a browser communicates with a website to access private information. On the other hand, public key encryption involves the use of different keys for the two actions; a public key is used for encryption, and a private key for decryption (Savage, 2016). An example of a real-world application of public key cryptography is where a browser creates a shared session key with a website.
Question Three
In the Presentation Layer, encryption can be used by protocols such as Secure Sockets Layer (SSL). Moreover, the Transport Layer Security (TLS) is another protocol which is an industry standard but similar to SSL. As a result, the real world application of these two protocols is similar and involves protecting data in transit between the browser and the web server (Tadaki & Doi, 2015).
References
Mone, G. (2013). Future-Proof Encryption. Communications of the ACM, 56(11), 12-14. doi:10.1145/2524713.2524718
Savage, N. (2016). The Key to Privacy. Communications of the ACM, 59(6), 12-14. doi:10.1145/2911979
Tadaki, K., & Doi, N. (2015). Cryptography and Algorithmic Randomness. Theory of Computing Systems, 56(3), 544-580. doi:10.1007/s00224-014-9545-9