Videos

Published on August 7th, 2018 📆 | 3484 Views ⚑

0

Symmetric Key Cryptography VS Asymmetric Key Cryptography | Private vs Public Key Cryptography


iSpeech


Understand the working of Symmetric Key Cryptography and Asymmetric Key Cryptography in detail with working and difference between the 2 types.

Symmetric Key Cryptography(Private Key Cryptography) -
1. In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver(for decryption).
2. The key is shared.
3. The key is Secret and kept Private between the Sender & Receiver
4. For N users in a network the number of keys required is - N(N-1)/2

Asymmetric Key Cryptography(Public Key Cryptography)
1. In asymmetric-key cryptography, 2 different keys are used. 1 for Encryption & 1 for Decryption.
2. Every communicating party needs just a key pair.
3. One of the two keys is called as Public Key and the other is the Private Key.
4. Private key remains as a secret. Public key is for the general public.
5. Only the corresponding public private key pair and encrypt and decrypt messages and no other key can be used.
6. For N users in a network the number of keys required is - N*2.

Complete Network Security / Information Security Playlist - https://www.youtube.com/watch?v=IkfggBVUJxY&list=PLIY8eNdw5tW_7-QrsY_n9nC0Xfhs1tLEK

Download my FREE Network Security Android App - https://play.google.com/store/apps/details?id=com.intelisenze.networksecuritytutorials





Simple Snippets Official Website -
http://simplesnippets.tech/
Simple Snippets on Facebook -
https://www.facebook.com/simplesnippets/
Simple Snippets on Instagram -
https://www.instagram.com/simplesnippets/
Simple Snippets on Twitter -
https://twitter.com/simplesnippet
Simple Snippets Google Plus Page -
https://plus.google.com/+SimpleSnippets
Simple Snippets email ID -
simplesnippetsinfo@gmail.com

For More Technology News, Latest Updates and Blog articles visit our Official Website - http://simplesnippets.tech/

#SymmetricKeyCryptography #AsymmetricKeyCryptography #NetworkSecurity #Cryptography


2018-08-07 13:30:01

source

Tagged with:



Comments are closed.