0% found this document useful (0 votes)
7 views

Types of Cryptography

Uploaded by

sarmadali4097
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Types of Cryptography

Uploaded by

sarmadali4097
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Submitted to: Sir Muhammad Azam Razzaq

Submitted by: Ali Raza


Roll No. : F22NDOCS1M01163
Class: 4th-M_C
Subject: Information Security
Dated: 23 November 2024.

Types of Encryption/Cryptography

Symmetric Encryption/Cryptography:
Symmetric Encryption/Crypography is also known as secret-key
cryptography. Data is encrypted using a key and the decryption is also done using
the same key. There are a few strategies used in cryptography algorithms. For
encryption and decryption processes, some algorithms employ a unique key. In
such operations, the unique key must be secured since the system or person who
knows the key has complete authentication to decode the message for reading.
Asymmetric Encryption/Cryptography:
Asymmetric Encryption/Cryptography is also known as public-key
cryptography. It uses public and private keys for the encryption and decryption of
message. One key in the pair can be shared with everyone. On the other hand,
second key in the pair is kept secret and is only known by the owner.

Differences
Feature Symmetric Cryptography Asymmetric
Cryptography
Key Type Single key (Same for Key Pair (Public and
encryption and Private key)
decryption)
Key Distribution Must securely share the Public key can be freely
secret key distributed
Performance Faster, more efficient Slower, computationally
issue
Security Relies on key secrecy Public key can be
exposed, private key
remains secret
Example Algorithm AES, DES, Blowfish RSA, ECC, DSA
Typical Use Data encryption (bulk Digital signatures, key
data) exchange, secure
communication

Hybrid Approach:
Many systems use both methods together. For example, in SSL/TLS:
1. Asymmetric cryptography is used to exchange a symmetric session key.
2. Then, symmetric encryption is used for the actual data transfer.

You might also like