Ans:
Symmetric-key algorithms are a set of algorithms for cryptography that make use of immaterially correlated, often identical, cryptographic keys for both decryption and encryption. The encryption key is slightly related to the decryption key, in that they may be identical or there is a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.
Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography.
In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use.
In an asymmetric key, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone. When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers.
Difference between symmetric and asymmetric key cryptography?
Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised.
The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.
See more
Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009).
And read more, the following suggested readings are enlisted here:
Symmetric-key algorithms are a set of algorithms for cryptography that make use of immaterially correlated, often identical, cryptographic keys for both decryption and encryption. The encryption key is slightly related to the decryption key, in that they may be identical or there is a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.
Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography.
In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use.
In an asymmetric key, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone. When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers.
Difference between symmetric and asymmetric key cryptography?
Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised.
The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.
See more
Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009).
And read more, the following suggested readings are enlisted here:
- Description of Symmetric and Asymmetric Encryption
- Symmetric vs. asymmetric algorithms
- Symmetric-key algorithm – Wikipedia, the free encyclopedia
- Public-key cryptography – Wikipedia, the free encyclopedia
- WikiAnswers – Difference between symmetric and asymmetric key …
- Symmetric and Asymmetric ciphers
- SQL Server Encryption Symmetric vs. Asymmetric Keys
- Combining Symmetric and Asymmetric Encryption – CodeProject
- Microchip Technology Announces dsPIC30F Symmetric and Asymmetric
- SA Laboratories – A Cost-Based Security Analysis of Symmetric and …
এই মন্তব্যটি লেখক দ্বারা সরানো হয়েছে।
উত্তরমুছুন