In the previous article series, we discussed the encryption and decryption processes. We know that encryption plays a crucial role in securing sensitive information from unauthorized access. In this article, we’ll look at the two fundamental methods of encryption : symmetric and asymmetric.
The main difference between symmetric and asymmetric encryption is the usage of the cryptographic keys. A particular algorithm is categorized under a given category by considering whether it uses the same key for encryption and decryption, or it needs two separate keys.
Symmetric encryption, also known as secret-key, or single-key encryption, uses only a single key for both encryption and decryption processes. Both the sender and the recipient have to use the same key for the encryption and decryption process in this schema. The most widely used symmetric encryption algorithms are Advanced Encryption Standard (AES), Blowfish, Data Encryption Standard (DES), and Triple DES (3DES). If implemented correctly, AES is the most robust and highly secured algorithm among them.
Advantages
Disadvantages
Special Note: Typically, symmetric encryption is defined as using the same key for both encryption and decryption. However, there are specific algorithms, like the Hill-Cipher , which are still considered symmetric even though the encryption and decryption keys are different. The reason is that one key can be easily derived from the other. In the Hill-Cipher, the encryption key is a matrix, and the decryption key is its inverse. Calculating the decryption key doesn't involve any secret or complex math problems, which is why it still falls under symmetric encryption.
Asymmetric encryption, also known as public-key encryption, uses two different keys: one for encryption and one for decryption. These keys are called the public key and the private key, and they are mathematically linked. We’ll explore this more in upcoming articles.
As their names suggest, the public key tends to be publicly (freely) available for anyone who wishes to send an encrypted message to the key pair owner, while the private key is kept secure by the key pair owner.
The beauty of asymmetric encryption is that if you use one key for the encryption process, you have to use the other key for the decryption process. Imagine this :
The most commonly used asymmetric encryption algorithm is RSA.However, a newer algorithm called Elliptic Curve Cryptography (ECC) is becoming popular. ECC is more efficient and provides the same security strength as RSA but with shorter key lengths.
Advantages
Disadvantages
We've covered the basics of symmetric and asymmetric encryption. In the next article, we'll explore how these concepts are applied in the real world.