Professional Documents
Culture Documents
Original 1688556290 Methods of Cryptography PDF
Original 1688556290 Methods of Cryptography PDF
There are two primary methods of cryptography. These are symmetric and asymmetric
encryption. They each have their advantages and disadvantages that make them better
suited for different use cases.
Symmetric Encryption
In symmetric encryption, a single key is used for both encrypting and decrypting data, and
this key is shared between the sender and receiver, who keep it secret to prevent
unauthorised access. Although this method is generally faster and simpler than asymmetric
encryption, it may not be as secure.
Symmetric encryption is faster and more efficient than asymmetric encryption, as it only
requires one key to encrypt and decrypt data. However, the same key must be shared
between the sender and receiver, which can be a challenge if they have never
communicated before.
Additionally, symmetric encryption does not provide authentication, meaning that the
receiver cannot verify the identity of the sender.
Asymmetric Encryption
Asymmetric encryption, also referred to as public-key encryption, employs two distinct keys
for encrypting and decrypting data. When using this method, the sender utilises the
recipient's public key to encrypt the data, which can only be decrypted by the recipient's
private key. Although this technique is often slower and more complicated than symmetric
encryption, it offers better security as the private key is kept confidential.
By using both symmetric and asymmetric encryption together, we can take advantage of the
strengths of each method while minimising their weaknesses.
Also, using two distinct encryption techniques, we can customise our encryption methods
according to the particular requirements of a communication scenario, thereby offering a
more comprehensive approach to safeguarding confidential information.
To address the issue of key distribution, symmetric encryption employs various key
exchange and distribution techniques, such as secure key exchange protocols or key
agreement algorithms. Additionally, symmetric encryption can be used in combination with
other cryptographic methods, such as digital signatures, to further enhance its security.
•Asymmetric encryption is used to secure SSH connections, which are used for
Secure Shell
secure remote access to servers and other devices. SSH uses public-key
(SSH)
cryptography to authenticate the server and the client, and to establish a
connections
secure communication channel.