2. DEFINITION
Encryption is a technique used
to protect data stored on
computer systems and data
transmitted via computer
networks, including the Internet.
3.
4. Symmetric encryption
What is Symmetric Encryption?
Symmetric encryption is a type of encryption where only one key (a
secret key) is used to both encrypt and decrypt electronic data. The
entities communicating via symmetric encryption must exchange the
key so that it can be used in the decryption process.
5.
6. What is Asymmetric cryptography?
Asymmetric cryptography, also known as public-key cryptography, is a
process that uses a pair of related keys -- one public key and one private
key -- to encrypt and decrypt a message and protect it from unauthorized
access or use.
7.
8. Key Differences Symmetric Encryption Asymmetric Encryption
Size of cipher text
Smaller cipher text compares to original plain text
file.
Larger cipher text compares to original plain text
file.
Data size Used to transmit big data. Used to transmit small data.
Resource Utilization
Symmetric key encryption works on low usage of
resources.
Asymmetric encryption requires high consumption
of resources.
Key Lengths 128 or 256-bit key size. RSA 2048-bit or higher key size.
Security Less secured due to use a single key for encryption.
Much safer as two keys are involved in encryption
and decryption.
Number of keys
Symmetric Encryption uses a single key for
encryption and decryption.
Asymmetric Encryption uses two keys for
encryption and decryption
Techniques It is an old technique. It is a modern encryption technique.
Confidentiality
A single key for encryption and decryption has
chances of key compromised.
Two keys separately made for encryption and
decryption that removes the need to share a key.
Speed Symmetric encryption is fast technique
Asymmetric encryption is slower in terms of
speed.
Algorithms RC4, AES, DES, 3DES, and QUAD. RSA, Diffie-Hellman, ECC algorithms.
9. What is an SSL?
SSL stands for Secure Sockets Layer and, in short, it's the
standard technology for keeping an internet connection
secure and safeguarding any sensitive data that is being
sent between two systems, preventing criminals from
reading and modifying any information transferred,
including potential personal details.
The two systems can be a server and a client (for
example, a shopping website and browser)
10. What is TLS?
TLS (Transport Layer Security) is just an updated, more secure,
version of SSL. TLS is actually just a more recent version of
SSL. It fixes some security issue which are in the earlier SSL
protocols.
11. SSL
SSL (Secure Socket Layer) is less secured as
compared to TLS(Transport Layer Security).
TLS
TLS (Transport Layer Security) provides high
security.
SSL is less reliable and slower.
TLS is highly reliable and upgraded. It
provides less latency.
12. What is Digital Certificates?
A digital certificate is basically a unique piece of code or a large number that says that
the Webserver is trusted by an independent source known as a certificate authority.
The certificate authority acts as a middleman that both computers trust. It confirms
that each computer is in fact who it says it is, and then provides the public keys of each
computer to the other.
13. How are digital certificates used?
Digital certificates are used in the following ways:
•Credit and debit cards use chip-embedded digital certificates that connect with
merchants and banks to ensure that the transactions performed are secure and
authentic.
•Digital payment companies use digital certificates to authenticate their automated
teller machines, kiosks and point-of-sale equipment in the field with a central server
in their data center.
•Websites use digital certificates for domain validation to show they are trusted and
authentic.