The differences between symmetric and asymmetric cryptography are explained below:
Symmetric Cryptography:
Symmetric encryption requires a single key known only to the authorized
parties.
- Symmetric encryption uses the same key to both encrypt and decrypt.
- The most commonly used symmetric encryption algorithms include DES, 3DES,AES, and RC4. 3DES and AES are commonly used in IPsec and other types of VPNs.
- Symmetric encryption algorithms can be extremely fast, and their
relatively low complexity allows for easy implementation in hardware.
- However, they require that all hosts participating in the encryption
have already been configured with the secret key through some external
means.
|
Figure: Symmetric Cryptography |
|
|
Asymmetric Cryptography
Asymmetric encryption uses a pair of keys, one key available
publicly (the "public key" and one key k(the "private key" or "secret
key" own only to the person the public key belongs to.
- Asymmetric encryption uses one key to encrypt and a different one to
decrypt.
If the owner is encrypting, they use the private key to encrypt
and the recipient uses the corresponding public key to decrypt the
message. If the owner is the recipient, the sender uses the public key
to encrypt and the owner/recipient uses their private key to decrypt.
- The most common asymmetric encryption algorithm is RSA.
- Compared to symmetric encryption, asymmetric encryption imposes a high
computational burden, and tends to be much slower. Thus, it isn't
typically employed to protect payload data. Instead, its major strength
is its ability to establish a secure channel over a non-secure medium
(for example, the Internet). This is accomplished by the exchange of
public keys, which can only be used to encrypt data. The complementary
private key, which is never shared, is used to decrypt.
|
Asymmetric Cryptography |
0 comments:
Feel free to contact the admin for any suggestions and help.