top of page
Search
  • Writer's pictureBhanu Prasad

Symmetric vs. Asymmetric Algorithm.

Updated: Dec 27, 2021

Let's understand the terminology and the functionality difference between the Symmetric and Asymmetric Algorithms in simple terms.


Encryption Algorithms are mathematical procedures used to alter the information, so it looks like meaningless data for the user who does not have the key to decrypt the information. AES, DES, and RC4 are examples of encryption algorithms.


The hashing algorithm (or function) is a procedure that takes a random block of data and returns a fixed-size bit string known as a hash value such that an accidental or intentional change of data will change the hash value. SHA-256, SHA-512 are examples of Hashing Algorithms.


A cipher suite is a combination of Authentication, encryption, and message authentication code (MAC) algorithms.


A Cipher suite is negotiated between the sender and receiver before exchanging the information to establish a network connection.


We all know by the word symmetric means the same key is used for both encryption and decryption in symmetric key encryption.


Let's see it in a simple diagram to understand the Symmetric Key encryption as below.




Symmetric Key encryption example, User trying to access the wireless network using Pre-shared key. Symmetric Algorithm examples are Advanced Encryption Standard(AES), Rivest Cipher 4 (RC4).


In Asymmetric key encryption, two different keys are used for encryption and decryption, known as Public key and Private key.


The public key is shared with all entities with whom a secure connection is desired.


The private key is never shared.


In Asymmetric key encryption, the information is encrypted by the public key can be decrypted only by the private key. Examples are Deffie-hellman, Digital Signature Algorithms.


Let's see it in a simple diagram to understand the ASymmetric Key encryption as below.


Asymmetric key encryption example, users trying to access the secure web server or website using HTTPS connection below.




We can recall people saying/seeing warnings do not to use HTTP connection to provide confidential information like credit card information etc.


Thanks for viewing the article, please leave a feedback comment (good or bad), so that I can improve.

138 views0 comments

Recent Posts

See All

RADIUS Attribute Proxy-State

RADIUS is a networking Protocol that provides AAA services and is commonly seen in any Enterprise network. In this article, we will discuss the importance Radius attribute Proxy-state which is seen on

Opportunistic Wireless Encryption(OWE)

Opportunistic Wireless Encryption (OWE) /enhanced open authentication helps secure the data to be precise encrypt data. If a hacker/anyone eavesdropping will not understand the data collected, the inf

bottom of page