Cryptography

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Jhomar B.

Gorospe ASSIGNMENT
BSIT DD3B

ASYMMETRIC ENCRYPTION:

Secure Communication: Asymmetric encryption is commonly used in secure

communication protocols like HTTPS for securing online transactions,

email encryption (PGP/GPG), and secure messaging apps where a public

key is used for encryption, and a private key is used for decryption.

Digital Signatures: Asymmetric encryption is employed in digital

signatures to verify the authenticity and integrity of digital

messages or documents. This is crucial in various online transactions

and software distribution processes.

Key Exchange in Diffie-Hellman: Asymmetric encryption plays a key role

in the Diffie-Hellman key exchange algorithm, allowing two parties to

agree on a shared secret key over an insecure communication channel

without directly transmitting the key.

SSL/TLS Handshake: Asymmetric encryption is used in the initial phase

of the SSL/TLS handshake process to establish a secure connection

between a client and a server. The public-private key pair ensures

secure key exchange.

Certificate Authorities (CAs): Asymmetric encryption is fundamental in

the operation of Certificate Authorities, where the CA's private key

is used to sign digital certificates, and the corresponding public

keys are used for verification.


Jhomar B. Gorospe ASSIGNMENT
BSIT DD3B

SYMMETRIC ENCRYPTION:

Data Encryption Standard (DES): Symmetric encryption is used in older

cryptographic protocols like DES, where the same secret key is used

for both encryption and decryption.

File and Disk Encryption: Symmetric encryption is commonly used to

encrypt entire disks or individual files. Technologies like BitLocker

and FileVault use symmetric encryption to protect data stored on

disks.

VPN (Virtual Private Network): Symmetric encryption is often employed

in VPNs to secure the communication between a user's device and a VPN

server. It ensures that the transmitted data is confidential and

secure.

Wi-Fi Security (WPA2/WPA3): Symmetric encryption is used in Wi-Fi

security protocols (WPA2/WPA3) to secure wireless communication

between devices and access points. A pre-shared key is used for

encryption.

AES (Advanced Encryption Standard): Symmetric encryption is a core

component of AES, widely used to secure sensitive information. It is

utilized in various applications, including secure communication, file

encryption, and data protection.


Jhomar B. Gorospe ASSIGNMENT
BSIT DD3B

DIFFERENCES OF ASYMMETRIC ENCRYPTION AND SYMMETRIC ENCRYPTION


ASSYMETRIC ENCRYPTION SYMMETRIC ENCRYPTION
Key Type
Involves a pair of keys, a public Uses a single, shared secret key
key for encryption and a private for both encryption and
key for decryption. The keys are decryption. The same key is used
mathematically related but cannot by both parties involved in the
be derived from one another. communication.
Key Distribution
Public keys can be freely Requires secure key distribution,
distributed, but private keys as both communicating parties
must be kept confidential. This need to possess the same secret
simplifies the key distribution key. This can be challenging in
problem compared to symmetric open networks.
encryption.
Computational Complexity
Involves more complex Generally faster and
mathematical operations, making computationally less intensive
it slower than symmetric than asymmetric encryption. Well-
encryption. Typically used for suited for large volumes of data.
key exchange and digital
signatures rather than encrypting
large amounts of data.
Uses Cases
Primarily used for key exchange Efficient for bulk data
and digital signatures. Helps encryption, such as securing
establish secure communication files and messages. Commonly used
channels between parties who may in scenarios where performance is
not have a pre-established trust crucial.
relationship.
Scalability
Provides a scalable solution for Scales well for large-scale data
secure communication in a encryption but poses challenges
network, as each participant only for key distribution in a large
needs to manage their own key network.
pair.
Security
Offers higher security in terms Relies on the secrecy of the
of key distribution. Even if the shared key. If the key is
public key is known, it is compromised, the security of the
computationally infeasible to communication is at risk.
derive the private key.

You might also like