Mile2 Cybersecurity Institute

OCU C)ISSO A Discussion Lesson 08

Viewing 6 reply threads
  • Author
    Posts
    • #99322
      Manny Varela
      Keymaster

      Explain the specific differences between symmetric cryptography (chapter 7) and asymmetric cryptography.  Use terms from both chapters.  Be sure to compare the pros and cons of each.

    • #111371
      Carlos Martes
      Participant

      Symmetric and asymmetric cryptography are two different ways of protecting information. Symmetric cryptography uses ne shared key for both locking and technically unlocking decrypting data. This makes it fast and efficient, but both people must already have the same key, which can be hard to share safely. It is good for protecting large amounts of data quickly. Asymmetric cryptography uses two different keys which are a public key that anyone can see and a private key that only be opened with a private key. This makes key sharing much safer, but slower and uses more computer power. The strength of symmetric cryptography is speed. It’s weakness is key sharing. The strength of asymmetric cryptography is secure communication between strangers. It’s weakness is slower performance. Most systems today use both methods together for strong protection.

      • #111405
        Mjulius513
        Participant

        I like how you explained the differences between symmetric and asymmetric cryptography in simple terms. Your examples of shared keys versus public and private keys make it easy to understand. I also like that you highlighted the strengths and weaknesses of each and mentioned that combining both methods gives strong protection in real systems. Do you think symmetric or asymmetric cryptography is more important in everyday technology, and why?

      • #111457
        Isabelle Tubbs
        Participant

        Hi, Carlos. I like your overview of the advantages and disadvantages of symmetric and asymmetric encryption. Those are very important, but another difference between the two is what they are used for. Symmetric encryption can be used for certain bulk encryptions, while asymmetric encryption can be used for distribution.

    • #111394
      Mjulius513
      Participant

      Symmetric and asymmetric cryptography operate differently, each with its own advantages and disadvantages. Symmetric cryptography uses a single shared secret key for both encryption and decryption, making it very fast and suitable for protecting large amounts of data. The major weakness is called key distribution, because both parties must share the same key securely. If the key is stolen, all the encrypted data can be accessed. It also becomes more difficult to manage as the number of users increases, and each user requires their own shared key.

      Asymmetric cryptography uses two keys: a public key and a private key. The public key can be shared openly, while the private key remains secret. This solves the key exchange problem because no secret key needs to be transmitted. It also enables digital signatures, which help verify identity and ensure data integrity. The main drawback is that asymmetric cryptography is slower and requires more processing power. Overall, symmetric cryptography is faster, but asymmetric cryptography offers better security for exchanging keys and verifying identities.

      • #111610
        Trae Johnson
        Participant

        I agree that symmetric cryptography is very fast and works well for encrypting large amounts of data, but one of the serious limitations is the challenge of key distribution. Asymmetric cryptography solves this problem because the public key can be shared openly while the private key stays secure. It also allows for digital signatures, which are important for authentication and integrity. While slower, it plays a critical role in secure communications, especially for exchanging keys and verifying identities.

    • #111434
      Carlos Martes
      Participant

      Symmetric cryptography is fast and great for large data but struggles with key sharing, since both sides use the same secret ley. Asymmetric cryptography uses a public and private key, making key exchange safer and enabling digital signatures. It’s slower, but it provides stronger security for identity and communication.

    • #111456
      Isabelle Tubbs
      Participant

      Symmetric cryptography uses one key that must be shared between two or more users, and it typically is used for bulk encryption like paths and files. It has many advantages, including the fact that the number of keys it creates can grow with the number of users. Also, it can be much faster and provide confidentiality with some amount of access control. However, its fast speeds are partially due to its algorithm being less complex. Another disadvantage is that its key exchange is out of band, making it a potentially insecure exchange.

      Asymmetric cryptography, on the other hand, creates a pair of keys (both public and private) for each user. It provides a great way to ensure confidentiality, authentication, and non-repudiation, which are vital components for the safety of a system. It also distributes its public key safely and does not grow uncontrollably. One disadvantage though is that its complex algorithm does make it slower.

      • #111609
        Trae Johnson
        Participant

        You clearly explained how symmetric cryptography works and why it’s efficient for bulk encryption. I liked the fact that you underlined its speed advantage and how it provides confidentiality. One thing to note is that the reliance on key exchange may render it somewhat vulnerable, which is where asymmetric cryptography adds value through secure key distribution and authentication support, even though it’s much slower. Hybrid systems use both to achieve a balance in speed and security.

    • #111543
      Joseph Doss
      Participant

      The primary difference between symmetric and asymmetric cryptography is the handling of the decryption keys, in symmetric cryptography the key is the same across all ends, anyone with the key can decrypt the data this allows for faster encryption and decryption but less secure. Asymmetric on the other hand has a public and a private key the public key encrypts, the private, which only stays with the sender, is used to decrypt. allowing for more security but less speed.

    • #111608
      Trae Johnson
      Participant

      The main difference between symmetric and asymmetric cryptography lies in how they make use of keys for encrypting and decrypting information. Symmetric cryptography makes use of one secret key shared among the users in encrypting and decrypting data. This therefore makes it very fast and efficient for encrypting large amounts of information, such as files or messages. Its weakness, however, is that it requires key distribution: beforehand, both parties must exchange the key safely, and if the key is intercepted, all data encrypted under that key will be compromised.

      Asymmetric cryptography involves a pair of keys for each user: a public key that can be shared openly and a private key that remains secret. This solves the key distribution problem and also allows the use of digital signatures, which provide verification of the identity and integrity of data. The principal disadvantage is that the algorithms are more complex, therefore slower and requiring more processing power. In practice, hybrid approaches often combine symmetric encryption for speed and asymmetric encryption for secure key exchange, leveraging the strengths of both.

Viewing 6 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.