Symmetric, Asymmetric
Examples of techniques used for encrypting information include:
Symmetric encryption (also known as secret-key encryption or session-key encryption): This involves using the same key for both encryption and decryption. It is efficient but requires secure key distribution.
Asymmetric encryption (also known as public-key encryption): This involves using a pair of keys, a public key for encryption and a private key for decryption. It addresses the key distribution problem in symmetric encryption but is generally slower.
Last updated