Focus on deep analysis OF asymmetric and symmetric encryption & analyze them. Evaluate the differences between the two of them and which one that you would determine is the most secure.
Algorithms from :
- Design: the foundation of the design from mathematic, tables generated, static tables, feedback functions
- The use of the algorithms
2 pages, four scholarly articles and properly APA formatted