Symmetric, Asymmetric

Examples of techniques used for encrypting information include:

  • Symmetric encryption (also known as secret-key encryption or session-key encryption): This involves using the same key for both encryption and decryption. It is efficient but requires secure key distribution.

  • Asymmetric encryption (also known as public-key encryption): This involves using a pair of keys, a public key for encryption and a private key for decryption. It addresses the key distribution problem in symmetric encryption but is generally slower.

Last updated