Symmetrical vs asymmetrical Encryption Pros and Cons by Example
Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more.
In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one.
Chapters
0:00 Intro
1:50 Symmetric Encryption
9:40 Asymmetric Encryption
14:40 Symmetric Encryption Pros and Cons
17:05 Asymmetric Encryption Pros and Cons
20:20 Summary
1. Symmetric encryption
2. Asymmetrical encrypt
3. Pros and cons of Symmetric vs Asymmetric
Symmetric encryption
Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have something I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock.
The same key you use to encrypt is the same key to Decrypt.
Examples
Examples of popular symmetric-key algorithms include
AES
Twofish
Serpent
DES
Twofish, Serpent, AES (Rijndael), Blowfish
CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer+/++ (Bluetooth), and IDEA
Asymmetrical encryptions
We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesn't really have my key so we need to encrypt it..
Also called Public key encryption
1977
Rivest–Shamir–Adleman (RSA)
* Diffie–Hellman key exchange protocol
* DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
* ElGamal
* Various elliptic curve techniques
* Various password-authenticated key agreement techniques
* Paillier cryptosystem
* RSA encryption algorithm (PKCS#1)
* Cramer–Shoup cryptosystem
* YAK authenticated key agreement protocol
So TLS for example first transfer the symmetric key using asymmetrical encryption then communicate all the way using sym encryption
Symmetric encryption
pros
faster
Can be used to encrypt large data scales
cons
Very hard to transport the key 🔑
ASymmetric encryption
Pros
Keys can be shared across a network
Perfect for encryption small data such as ssh
cons
Slow
Rsa slower then aes
Cannot be used to
(1,2)
Number to power 1 mod 2
Summary
Sym. Encryption is used to encrypt large files, same key to encrypt is the same key to deycrpt they are very fast and efficient but keys need to exist on both machines to communicate.
Asym encryption can one key encrypt another key decrypts public key is
Stay Awesome!
Hussein
Видео Symmetrical vs asymmetrical Encryption Pros and Cons by Example канала Hussein Nasser
In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one.
Chapters
0:00 Intro
1:50 Symmetric Encryption
9:40 Asymmetric Encryption
14:40 Symmetric Encryption Pros and Cons
17:05 Asymmetric Encryption Pros and Cons
20:20 Summary
1. Symmetric encryption
2. Asymmetrical encrypt
3. Pros and cons of Symmetric vs Asymmetric
Symmetric encryption
Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have something I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock.
The same key you use to encrypt is the same key to Decrypt.
Examples
Examples of popular symmetric-key algorithms include
AES
Twofish
Serpent
DES
Twofish, Serpent, AES (Rijndael), Blowfish
CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer+/++ (Bluetooth), and IDEA
Asymmetrical encryptions
We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesn't really have my key so we need to encrypt it..
Also called Public key encryption
1977
Rivest–Shamir–Adleman (RSA)
* Diffie–Hellman key exchange protocol
* DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
* ElGamal
* Various elliptic curve techniques
* Various password-authenticated key agreement techniques
* Paillier cryptosystem
* RSA encryption algorithm (PKCS#1)
* Cramer–Shoup cryptosystem
* YAK authenticated key agreement protocol
So TLS for example first transfer the symmetric key using asymmetrical encryption then communicate all the way using sym encryption
Symmetric encryption
pros
faster
Can be used to encrypt large data scales
cons
Very hard to transport the key 🔑
ASymmetric encryption
Pros
Keys can be shared across a network
Perfect for encryption small data such as ssh
cons
Slow
Rsa slower then aes
Cannot be used to
(1,2)
Number to power 1 mod 2
Summary
Sym. Encryption is used to encrypt large files, same key to encrypt is the same key to deycrpt they are very fast and efficient but keys need to exist on both machines to communicate.
Asym encryption can one key encrypt another key decrypts public key is
Stay Awesome!
Hussein
Видео Symmetrical vs asymmetrical Encryption Pros and Cons by Example канала Hussein Nasser
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Asymmetric Encryption - Simply explainedHashing vs Encryption DifferencesSecret Key Exchange (Diffie-Hellman) - ComputerphileSymmetric vs Asymmetric Encryption – What is the Difference?Microservices Explained and their Pros & ConsOne Encryption Standard to Rule Them All! - ComputerphileLecture 1: Introduction to Cryptography by Christof PaarWhat happens when you type google.com into your browser and press enter? (Detailed Analysis)The RSA Encryption Algorithm (1 of 2: Computing an Example)What are SSL/TLS Certificates? Why do we Need them? and How do they Work?The software engineer mental healthWebSockets Crash Course - Handshake, Use-cases, Pros & Cons and moreSymmetric and Asymmetric Encryption - CompTIA Security+ SY0-501 - 6.1DES Algorithm (Data Encryption Standard algorithm) | Complete Working | Types - Double & Triple DESSymmetric vs. Asymmetric Encryption - CompTIA Security+ SY0-401: 6.1TLS Handshake Explained - ComputerphileTCP vs UDP Crash CourseLoad balancing in Layer 4 vs Layer 7 with HAPROXY ExamplesPublish-Subscribe Architecture (Explained by Example)