Symmetric And Asymmetric Cryptography

in Project HOPE3 years ago

images.pngsumber

What is symmetric and asymmetric cryptography


Data encryption is generally done in 3 ways. This ; keyless encryption, symmetric encryption, asymmetric encryption.

In the keyless encryption method, no key is used when encrypting the data. I will not discuss this encryption method further because the professor asked us to talk about symmetric encryption and asymmetric encryption methods.

Symmetric Cryptography


The type of encryption in which the key used when encrypting the data and then decrypting the data is the same in both cases is called the symmetric encryption method. Before data transfer, the recipient and the sender must determine the private key and decide on the key. This is also called secret key encryption by some.

The parties i.e. sender and receiver must have a secret key to encrypt or decrypt the data.

It is possible to cite Blowfish among examples of symmetric encryption. AES-256 is also an example of a symmetric encryption algorithm and is widely used.

The biggest disadvantages of this type of encryption are as follows. This would create a security vulnerability if the receiver and sender exchanged the keys they would use for encryption.

Asymmetric Cryptography


In this encryption method, the key used for encryption and the key used for decryption must be different from each other. In other words, two different keys are used when encrypting the text. This encryption method is called private key encryption. The public key and private key are used for encryption and decryption.

The public key is public. Anyone who wants to message you can access it. But the private key is secret, it only exists on one side.

This encryption method is generally used in applications used in everyday communication over the Internet. ElGamal is one of the most popular asymmetric encryption algorithms.

Symmetric encryption and asymmetric encryption methods have different properties. Symmetric encryption is faster than asymmetric encryption.

Symmetric encryption is used to transmit large data while asymmetric encryption is used to transmit relatively small data.

Symmetric encryption requires lower resource consumption, while asymmetric encryption requires greater resource consumption.

Asymmetric encryption is much more reliable than symmetric encryption. Because, while two keys are used in asymmetric encryption, only one key is used in symmetric encryption.

While the symmetric encryption technique is one of the older encryption techniques, the asymmetric encryption technique is one of the more modern encryption techniques being used more and more today.


Thank You

Sort:  

hello @crypto-01,
cryptography is an art in which one tries to create a security pattern that is inviolable. With this in mind, I wonder if quantum computers are a danger to cryptography, since these computers have the ability to violate any security pattern.

Greetings @cripto-01, entertaining reading, no doubt to think of making life in this medium was unaware of this symmetric and asymmetric cryptography and the importance it plays in the blockchain world and cryptocurrencies in general.

Greetings...

Cryptography is the basis of cryptocurrencies, knowing these concepts is essential to understand how the cryptographic world works, especially the use of asymmetric encryption has allowed operations to be carried out with great security, thus preventing third parties from appropriating the shared information.

Cryptography is a way to secure the transactions and you have nicely explain both the part of it. I think that since we are part of 50 words we should know these technical aspects and this are helping us to make aware about the overall transactional ecosystem.

Coin Marketplace

STEEM 0.17
TRX 0.13
JST 0.027
BTC 61078.25
ETH 2671.36
USDT 1.00
SBD 2.51