Disadvantage of Symmetric Key Algorithm With Example1
Disadvantage of Symmetric Key Algorithm With Example1
The size of cipher text is the same or smaller than the The size of cipher text is the same or
original plain text. larger than the original plain text.
It is used when a large amount of data is required to It is used to transfer small amounts of
transfer. data.
The length of key used is 128 or 256 bits The length of key used is 2048 or higher
In symmetric key encryption, resource utilization is low In asymmetric key encryption, resource
as compared to asymmetric key encryption. utilization is high.
It is efficient as it is used for handling large amount of It is comparatively less efficient as it can
data. handle a small amount of data.
For example, Let's say Alice wants to send a message to Bob, She will use the key to
encrypt the message, and Bob will use the same key to decrypt the message.
On the other hand, Asymmetric encryption, also known as public key encryption,
uses two different keys for encryption and decryption of the message. One key,
known as the public key, is used for encryption and is shared with everyone. The
other key, known as the private key, is used for decryption and is kept secret by the
owner. An example of asymmetric encryption algorithm is RSA (Rivest-Shamir-
Adleman).
For example, Let's say Alice wants to send a message to Bob, She will use Bob's
public key to encrypt the message, and Bob will use his private key to decrypt the
message.
In Summary, Symmetric encryption uses the same key for encryption and decryption
while Asymmetric encryption uses different key for encryption and decryption, one is
public and other is private.
Disadvantage of symmetric key algorithm with example
1. Key distribution: In order for two parties to communicate securely using a symmetric
key algorithm, they must first securely exchange the key. This can be difficult to do in
practice. For example, if Alice and Bob want to communicate securely using a
symmetric key algorithm, they must first find a secure way to exchange the key. This
may involve meeting in person, using a secure courier, or using a secure key
exchange algorithm.
2. Key management: Symmetric key algorithms require that both parties have a copy of
the key, which means that the key must be stored and protected securely. If a key is
lost or compromised, all previous communications using that key are also
compromised. For example, if Alice and Bob are using a symmetric key algorithm to
communicate and the key is stolen or lost, all of their previous communications will
be compromised.
3. Scaling: As the number of parties increases, the number of keys required also
increases. This can lead to key management issues and can make it difficult to
securely distribute keys to all parties. For example, if Alice, Bob, and Carol want to
communicate securely using a symmetric key algorithm, they will need one key for
each pair of parties. This means that Alice will need a key for each of Bob and Carol,
Bob will need a key for each of Alice and Carol, and Carol will need a key for each of
Alice and Bob.
4. Limited use: Symmetric key algorithms are typically only suitable for encrypting data,
and cannot be used for other purposes such as digital signing or authentication. For
example, if Alice wants to send Bob a signed document, she cannot use a symmetric
key algorithm because it cannot be used for digital signing.
5. Security: symmetric key algorithm are less secure than asymmetric key algorithm
because if the key is cracked, all the data encrypted with that key can be decrypted.
For example, if an attacker manages to crack the key being used by Alice and Bob to
communicate, they will be able to decrypt all the previous communications between
them.