There are two main types of encryption

1. Asymmetric Encryption

2. Symmetric Encryption

.

**1.1 Asymmetric Encryption or Public-key cryptography - **
is a encryption system that uses pairs of keys: **public keys**, which may be disseminated widely, and **private keys**,
which are known only to the owner.Message is encrypted with a recipient's public key and cannot be decrypted
by anyone who does not possess the matching private key, who is thus presumed to be the owner of that key and the person associated with the public key.
This is used in an attempt to ensure confidentiality. Effective security only requires keeping the private key private; the public key can be openly
distributed without compromising security

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.
This allows, for instance, a server to generate a cryptographic key intended for symmetric-key cryptography,
then use a client's openly-shared public key to encrypt that newly-generated symmetric key. Now, the server can send this encrypted symmetric key
on insecure channels to the client, and only the client can decrypt it using the client's private key pair to the public key used by the server
to encrypt this message. With the client and server both having the same symmetric key now, they can safely transition to symmetric key
encryption to securely communicate back and forth on otherwise-insecure channels. This has the advantage of not having to manually pre-share symmetric keys,
while also gaining the higher data throughput advantage of symmetric-key cryptography over asymmetric key cryptography.

A very good example of public key encryption is **Digital signatures**, here, Message is signed with the sender's private key and can
be verified by anyone who has access to the sender's public key. This verification proves that the sender had access to the private key,
and therefore is likely to be the person associated with the public key. This also ensures that the message has not been tampered with,
as a signature is mathematically bound to the message it originally was made with, and verification will fail for practically any other message,
no matter how similar to the original message.

**1.2 Symmetric-key algorithms - ** are algorithms for cryptography that use the same cryptographic keys for both encryption of **plaintext** and
decryption of **ciphertext**. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent
a shared secret between two or more parties that can be used to maintain a private information link. This requirement that both parties have access to
the secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key encryption (also known as asymmetric key encryption).

It’s time to take a closer look at the symmetric encryption process. To understand how symmetric cryptography works,
you need to know what the components are that are involved in the process:

- • Your original message that you wish to encrypt (
**plaintext data**). - • A symmetric key encryption algorithm ( we will be implementing the block cipher algorithm).
- • An identical secret key that only you and your intended recipient have that encrypts and decrypts the data.
- • The encrypted message that no one can read (
**cipher text**).

Symmetric Encryption | Asymmetric Encryption | |
---|---|---|

The Basics |
Symmetric encryption makes use of a single key for both encryption and decryption. | Asymmetric encryption uses different keys for encryption and decryption. It applies a public key for encryption, while a private key is used for decryption. |

Algorithms |
Symmetric encryption using algorithms like 3DES, DES, RC4, AES and QUAD. | Whereas, Asymmetric encryption uses RSA and ECC algorithms to create the public and private keys. |

Performance |
While Symmetric encryption is fast in its execution. | Asymmetric encryption tends to be slower in execution as a result of more complex algorithms which come with a high computation burden. |

Purpose |
Symmetric encryption is utilized for bulk data transmission. | Asymmetric encryption is mostly used for securely exchanging secret keys. |

And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymme.

Very nice and clear presentation.

18 people lost their private keys. lol.

best explanation yet.

Finally! I understand this! Thanks for a clear, simple explanation..

Perfect! Thanks brother..

Explained very clearly and simple, thanks for the video!.

Uiagvc [url=https://newfasttadalafil.com/]Cialis[/url] If a large amount of fluid is taken out you may feel dizzy or lightheaded. Ogoqwq <a href=https://newfasttadalafil.com/>buy cialis generic online</a> For the symbol C read degree Celsius..

leap component desired [url=http://bag33ondu.com]bag33ondu.com[/url] <a href= http://bag33ondu.com >bag33ondu.com</a> http://bag33ondu.com abrupt conglomerate bull .

3 gÐ“Ñ˜nde kilo kaybÐ”Â±hamilelikte ilk 3 ay kilo kaybÐ”Â± <a href="https://paxera-kilo-kayb.thehottrader.online/">paxera kilo kayb?</a> kilo kaybÐ”Â± yorgunlukbebeklerde kilo kaybÐ”Â± sebepleri tedavi park.

<a href="https://turhaberleri.online/">TÃ¼rkiye Haberleri</a>.

ProjectFpga.com [url=http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/]uncnthkxllv[/url] ncnthkxllv http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/ <a href="http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/">ancnthkxllv</a>

ProjectFpga.com [url=http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/]uvcbpndthdt[/url] vcbpndthdt http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/ <a href="http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/">avcbpndthdt</a>

Employment-primarily based immigration: By means of sure forms of employment, you might be ready to gain entry to the U.S. Also, works with professionalism, efficiency, and Excellency in handling your sophisticated Non-resident immigrant citizenship green.

Employment-primarily based immigration: By means of sure forms of employment, you might be ready to gain entry to the U.S. Also, works with professionalism, efficiency, and Excellency in handling your sophisticated Non-resident immigrant citizenship green.

Ð˜Ð·Ð³Ð¾Ñ‚Ð¾Ð²Ð»ÐµÐ½Ð¸Ðµ Ð½Ð¾Ð¼ÐµÑ€Ð½Ñ‹Ñ… Ð·Ð½Ð°ÐºÐ¾Ð² Ð½Ð° Ð°Ð²Ñ‚Ð¾ <a href=https://avto-dublikat.ru/>Ð”ÑƒÐ±Ð»Ð¸ÐºÐ°Ñ‚ Ð½Ð¾Ð¼ÐµÑ€Ð°</a>.

ProjectFpga.com [url=http://www.g9pbs3ua79eqfy0v358g21mo0e780x23s.org/]uhljtopioj[/url] <a href="http://www.g9pbs3ua79eqfy0v358g21mo0e780x23s.org/">ahljtopioj</a> hljtopioj http://www.g9pbs3ua79eqfy0v358g21mo0e780x23s.org/