0% found this document useful (0 votes)
94 views

Symmetric and Astymteric

Symmetric encryption uses a single key for both encryption and decryption of messages. It encrypts plain text into ciphertext using an encryption algorithm and key, and decrypts ciphertext back to plain text using the same key and decryption algorithm. Symmetric encryption is faster than asymmetric encryption and is used for bulk data transmission, since symmetric encryption algorithms are less complex. In asymmetric encryption, different keys are used for encryption and decryption - a public key encrypts the message, and the corresponding private key decrypts it. Asymmetric encryption is slower but is used to securely exchange keys for symmetric encryption between parties.

Uploaded by

Yash Rajpurohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Symmetric and Astymteric

Symmetric encryption uses a single key for both encryption and decryption of messages. It encrypts plain text into ciphertext using an encryption algorithm and key, and decrypts ciphertext back to plain text using the same key and decryption algorithm. Symmetric encryption is faster than asymmetric encryption and is used for bulk data transmission, since symmetric encryption algorithms are less complex. In asymmetric encryption, different keys are used for encryption and decryption - a public key encrypts the message, and the corresponding private key decrypts it. Asymmetric encryption is slower but is used to securely exchange keys for symmetric encryption between parties.

Uploaded by

Yash Rajpurohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Symmetric encryption is a technique which allows the

use of only one key for performing both the


encryption and the decryption of the message shared
over the internet. It is also known as the conventional
method used for encryption. In symmetric encryption,
the plaintext is encrypted and is converted to the
ciphertext using a key and an encryption algorithm.
While the cipher text is converted back to plain text
using the same key that was used for encryption, and
the decryption algorithm.

Symmetric
encryption algorithm executes faster and is less complex hence; they are
used for bulk data transmission. In symmetric encryption, the host that
are participating in the communication already have the secret key that is
received through the external means. The sender of the message or
information will use the key for encrypting the message, and the receiver
will use the key for decrypting the message. The commonly used symmetric
encryption algorithms are DES, 3 DES, AES, RC4.

Definition of Asymmetric Encryption

Asymmetric encryption is an encryption technique that uses a pair of key


(private key and public key) for encryption and decryption. Asymmetric
encryption uses the public key for the encryption of the message and the
private key for the decryption of the message. The public key is freely
available to anyone who is interested in sending the message. The private
key is kept secret with the receiver of the message. Any message that is
encrypted by the public key and the algorithm, is decrypted using the same
the algorithm and the matching private key of corresponding public key.

The
asymmetric encryption algorithm execution is slow. As asymmetric
encryption algorithm are complex in nature and have the high computational
burden. Hence, the asymmetric encryption is used for securely
exchanging the keys instead of the bulk data transmission. Asymmetric
encryption is generally used for establishing a secure channel over the non-
secure medium like the internet. The most common asymmetric encryption
algorithm are Diffie-Hellman and RSA algorithm.

Key Differences Between Symmetric and Asymmetric


Encryption
1. Symmetric encryption always uses a single key for encryption and
decryption of the message. However, in asymmetric encryption, the
sender uses the public key for the encryption and private key for
decryption.
2. The execution of asymmetric encryption algorithms is slower as
compared to the symmetric encryption algorithm. This is because the
asymmetric encryption algorithms are more complex and has the high
computational burden.
3. The symmetric encryption algorithms that are most commonly used are
DES, 3DES, AES and RC4. On the other hand, Diffie-Hellman and RSA
area the most common algorithm used for asymmetric encryption.
4. The asymmetric encryption is generally used for exchanging secret keys
whereas, the symmetric encryption is used for exchanging a bulk of
data.
Asymmetric cryptography is a branch of cryptography where a secret key can be
divided into two parts, a public key and a private key. The public key can be given to
anyone, trusted or not, while the private key must be kept secret (just like the key in
symmetric cryptography).

Asymmetric cryptography has two primary use cases: authentication and confidentiality.
Using asymmetric cryptography, messages can be signed with a private key, and then
anyone with the public key is able to verify that the message was created by someone
possessing the corresponding private key. This can be combined with a proof of
identity system to know what entity (person or group) actually owns that private key,
providing authentication.

Encryption with asymmetric cryptography works in a slightly different way from


symmetric encryption. Someone with the public key is able to encrypt a message,
providing confidentiality, and then only the person in possession of the private key is
able to decrypt it.

You might also like