Reply To: OCU C)OST A Discussion Lesson 05
November 24, 2025 at 9:14 pm
#111450
Participant
You clearly explained the differences between symmetric encryption, asymmetric encryption, and hashing, along with practical examples for each. I especially liked how you pointed out that symmetric encryption, like AES, is fast and efficient when both parties can securely share a key, such as for encrypting files or databases. Your summary of asymmetric encryption with RSA was also spot-on. It’s ideal for secure communications between people who haven’t exchanged keys beforehand, which is crucial for things like HTTPS and digital signatures. Your take on hashing was great too, it’s not about hiding data, but about verifying integrity, like checking passwords or ensuring files haven’t been tampered with.