Discover a wealth of knowledge at Westonci.ca, where experts provide answers to your most pressing questions. Explore our Q&A platform to find reliable answers from a wide range of experts in different fields. Discover detailed answers to your questions from a wide network of experts on our comprehensive Q&A platform.

Both symmetric and asymmetric encryption methods have their places in securing enterprise data. Compare and contrast where each of these are used in real-life applications. Use at least one global example in identifying the differences between applications.

Sagot :


Symmetric Encryption:

Same key is used for Encryption and Decryption

Both server and client should have same key for encryption

Vulnerable to attack

Examples: Blowfish, AES, RC4, DES, RC5, and RC6

Asymmetric encryption:

Server generates its own public and private key

Client generates its own public and private key

Server and client exchanges their public keys

Server uses client’s public key to encrypt data

Client uses server ‘s public key to encrypt data

Server uses its private key to decrypt data sent by client

Client uses its private key to decrypt data sent by server

example: EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.

Hi there , Hope I helped !