L25. Compare the properties of symmetric vs asymmetric cryptography Flashcards
What is cryptography used for?
Securing communications
What are the two types of cryptographical algorithms?
Symmetric and asymmetric
How does symmetric cryptography work?
Symmetric cryptography, also known as secret-key or private-key cryptography, uses a single key for both encryption and decryption. The same key must be shared between the sender and the receiver.
What are the advantages of symmetric cryptography?
- Generally faster than asymmetric algorithms; suitable for real-time applications
- Require less computational power, making them suitable for encrypting large amounts of data quickly
- The use of a single key simplifies the encryption and decryption processes.
What is the main challenge of symmetric cryptography?
The secure distribution and management of keys. If the key is intercepted or disclosed, the security of the communication is compromised. Securely sharing the key between parties is problematic, especially over untrusted networks.
What is another disadvantage of symmetric cryptography, besides secure distribution of keys?
Scalability – in a network with many users, the number of keys required grows exponentially, complicating key management
What are examples of symmetric encryption algorithms?
AES, DES, and Blowfish/Twofish
Name two use cases for symmetric encryption
- Bulk Data Encryption: Due to their speed, symmetric algorithms are often used for encrypting large volumes of data, such as in file encryption or disk encryption.
- Network Security: Protocols like SSL/TLS and VPNs often use symmetric encryption for the actual data transfer after establishing a secure connection with asymmetric encryption.
How does assymetric cryptography work?
Asymmetric cryptography, also known as public-key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. The public key is shared openly, while the private key remains confidential.
Why is assymetric cryptography more secure?
The security of asymmetric algorithms is based on mathematical problems that are computationally infeasible to solve, such as factoring large prime numbers or computing discrete logarithms.
What is a disadvantage of assymetric cryptography?
Asymmetric cryptographic operations are more computationally intensive than symmetric ones, making them slower, particularly for large data sets.
Name two examples of assymetric cryptography algorithms
RSA and ECC
Name three use cases for assymetric cryptography
- Secure exchange of symmetric keys over an insecure channel. Once the symmetric key is shared, it is used for faster bulk data encryption.
- Creation of digital signatures, which verify the authenticity and integrity of a message or document.
- Protocols such as SSL/TLS use asymmetric cryptography to establish a secure connection before switching to symmetric encryption for data transfer.
What are two advantages of assymetric cryptography?
- It simplifies the process of establishing secure communications, because the public key can be freely distributed without compromising security
- Asymmetric cryptography scales better in environments with many users, as each user needs only a single key pair.
Name two disadvantages of assymetric cryptography
- Performance: Slower encryption and decryption processes make asymmetric cryptography less suitable for real-time or large-scale data encryption.
- Complexity: Asymmetric cryptography involves more complex algorithms and key management practices