Information Technology IT – 1 Data processing and information | e-Consult
1 Data processing and information (1 questions)
Login to see all questions.
Click on a question to view the answer
Symmetric encryption uses the same key for both encryption and decryption. This means the sender and receiver must share the same secret key. Common examples include AES and DES.
| Type | Advantage | Disadvantage |
| Symmetric | Fast encryption and decryption speeds. | Key distribution problem – securely sharing the key between sender and receiver can be challenging. |
Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. The public key can be freely distributed, while the private key must be kept secret. Common examples include RSA and ECC.
| Type | Advantage | Disadvantage |
| Asymmetric | Secure key exchange – public key can be shared without compromising security. | Slower encryption and decryption speeds compared to symmetric encryption. |
In summary, symmetric encryption is faster but requires a secure key exchange, while asymmetric encryption provides secure key exchange but is slower.