# Difference Between Symmetric and Asymmetric Encryption

### Difference Between Symmetric and Asymmetric Encryption

Difference Between Symmetric and Asymmetric Key Cryptography. There are two types of Cryptography Symmetric Key Cryptography and Asymmetric Key Cryptography. The fundamental difference that distinguishes symmetric and asymmetric encryption is that symmetric encryption allows encryption and decryption of the message with the same key. On the other hand, asymmetric encryption uses the public key for the encryption, and a private key is used for decryption.

## Symmetric Encryption

• Symmetric cipher models also called as secret key cryptography or symmetric key cryptography.
• In symmetric key cryptography, a single key is used for encryption as well as decryption.
• As shown in image sender encrypt plain text using a shared secret key and the resultant ciphertext is transmitted through a communication medium such as the Internet, at the receiver side, the ciphertext is decrypted using the same decryption key to obtain the original plain text.
• Note that encryption and decryption process uses a well known symmetric key algorithm called as Data Encryption Standard (DES). • Encryption of plain text, D (K, E(P)) = Decryption of Plain text using shared key K.
• For Example, Stream and block cipher, Data Encryption Standard (DES), Advanced Encryption Standard (AES) and BLOWFISH.
• Here the possibility is that if an attacker/opponent got cipher text ?? he/she might apply different permutations and combinations to decrypt and obtain the original plain text. Here the main aim of cryptography comes into the picture. Always sender has to think on applying different encoding technique on plain text message and convert it into ciphertext message so that the attacker cannot read the actual plain text easily.

• A Symmetric key is faster than asymmetric key cryptography
• Because of single key data cannot decrypt easily at receiver side even if it is intercepted by the attacker
• As the same key is used for encryption and decryption, a receiver must have the senders otherwise he cannot decrypt (without sender permission).
• Symmetric  key achieves the authentication principle because it checks the receiver’s identity.
• DES and AES techniques are implemented using symmetric key cryptography.
• System rcsourees are less utilized in symmetric key cryptography

### Disdvantages of Symmetric Encryption

• Once the key is stolen while transmitting data between sender and receiver it is very easy to decrypt the message as the same key is used for encryption and decryption
• symmetric key cryptography, a key is transmitted first and then a message is a transfer to the receiver. If the attacker intercepts the communication between sender and receiver, then he can decrypt the message before it reaches to intended recipients

## Asymmetric Encryption

• Asymmetric key cryptography is also called as public key cryptography.
• In asymmetric key cryptography two keys are used, one for encryption and other for decryption.
• As mentioned asymmetric key cryptography involves the use of two keys one is a public key that may know to everyone and can be used to encrypt messages, and verify signatures. Other is private key known only to the receiver of the message or verifier, used to decrypt messages, and sign (create) signatures.
• It is also called as asymmetric key cryptography because one key is used for encryption only its corresponding key must be used for decryption. No other key can decrypt the message. The sender and receiver can encrypt messages using an encryption key (public) or verify signatures, he cannot decrypt messages or create signatures because he required decryption key (private) which is known only to the receiver of the message. Public key cryptosystem /asymmetric key cryptography is shown in Image. • Mathematically it is represented as P = D(Kd, E (Ke,P))
• For example, sender Ramesh wants to communicate with the receiver Suresh then they must have each one of this i.e. private key and public key then and then communication will be successful.