Skip to content

Latest commit

 

History

History
50 lines (35 loc) · 5.52 KB

What is the difference between symmetric and asymmetric encryption.md

File metadata and controls

50 lines (35 loc) · 5.52 KB

Symmetric encryption vs Asymmetric encryption

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption.1

How encryption works in general2:

  • The sender uses an encryption key (usually a string of letters and numbers) to encrypt their message;
  • The encrypted message, called ciphertext, looks like scrambled letters and can’t be read by anyone along the way;
  • The recipient uses a decryption key to transform the ciphertext back into readable text.

Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys - one public key and one private key - to encrypt and decrypt a message and protect it from unauthorized access or use.

A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key - also known as a secret key - is shared only with key's initiator.3

Asymmetric cryptography typically gets used when increased security is the priority over speed and when identity verification is required, as the latter is not something symmetric cryptography supports. Some of the most common use cases for asymmetric cryptography include:4

  • Digital signatures: Confirming identity for someone to sign a document;
  • Blockchain: Confirming identity to authorize transactions for cryptocurrency;
  • Public key infrastructure (PKI): Governing encryption keys through the issuance and management of digital certificates.

Difference Between Symmetric and Asymmetric Key Encryption:5

Symmetric Key Encryption Asymmetric Key Encryption
It only requires a single key for both encryption and decryption It requires two keys, a public key and a private key, one to encrypt and the other to decrypt
The size of ciphertext is the same or smaller than the original plaintext The size of ciphertext is the same or larger than the original plaintext
The encryption process is very fast The encryption process is slow
It is used when a large amount of data needs to be transferred It is used to transfer small amount of data
It only provides confidentiality It provides confidentiality, authenticity, and non-repudiation
The length of key used is 128 or 256 bits The length of key used is 2048 or higher
Security is lower as only one key is used for both encryption and decryption purposes Security is higher as two keys are used, one for encryption and the other for decryption
Examples: 3DES, AES, DES and RC4 Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA

Links

Symmetric-key algorithm

Symmetric Encryption 101: Definition, How It Works & When It’s Used

asymmetric cryptography

When to Use Symmetric Encryption vs. Asymmetric Encryption

Difference Between Symmetric and Asymmetric Key Encryption

Further Reading

Symmetric and Asymmetric Key Encryption – Explained in Plain English

When Should You Use Symmetric vs Asymmetric Encryption?

Next questions

What do you know about Symmetric Key Encryption

What do you know about Asymmetric Key Encryption