Symmetric Encryption
one key used to encrypt (apply a mathematical formula to scramble the contents)
and also used to decrypt (apply a mathematical formula to unscramble the contents
What is the main risk of symmetric encryption?
The key must be shared between the sender and the receiver. If it falls into the wrong hands, the data can be decrypted by unauthorized users.
Definition of asymmetric encryption
Asymmetric encryption uses two keys: a public key (to encrypt) and a private key (to decrypt). The private key is never shared, and anyone with the public key can encrypt messages for the private key holder to decrypt
Asymmetric encryption (public key to private key)
Hide messages: Two keys are used to encrypt and decrypt. The private key is never shared, but you share the public key so anyone can encrypt it. Public key holders send to private key holders.
Asymmetric encryption (private key to public key)
Provide identity: A sender can encrypt with their private key. Only the corresponding public key can decrypt the message, proving that the message came from the holder of the private key, thus confirming identity.
What are the main uses of asymmetric encryption?
create public keys/accounts
create digital signatures
Unlocking process