Sr. No. | Symmetric Cryptography | Asymmetric Cryptography |
---|
1. | It requires a single key known only to the authorized parties. | It uses a pair of keys, one key is available publicly and second key is available privately. |
2. | It uses the same key to both encrypt and decrypt. | It uses one key to encrypt and a different one to decrypt. |
3. | It includes DES, 3DES, AES and RC4 symmetric encryption algorithms. | The most common asymmetric encryption algorithm is RSA. |
4. | Symmetric encryption is an age old technique. | Asymmetric encryption is new technique. |
5. | It is faster than asymmetric ciphers. | It is slower than symmetric cipher. |
6. | It requires a dingle key that must be shared by the sender and the receiver. | It solves the key distribution problem by using two keys, one of which is perfectly fine to share. |
7. | Encryption and decryption (confidentially), cannot be used for digital signatures (integrity and non-repudiation checks). | It can be used for encryption and decryption (confidentially) as well as for digital signatures (integrity and non-repudiation checks). |
8. | Algorithm is less complex and faster. | Algorithm is more complex and slower. |
9. | It computes incredibly fast, since the relatively simple operations executed very efficiently. | It computes slowly, using computationally heavy and complex operations, based on the difficulty of solving number-theoretic problems. |