From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Symmetric and asymmetric cryptography

Symmetric and asymmetric cryptography

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

Symmetric and asymmetric cryptography

- [Instructor] There are many different kinds of encryption algorithms and there are also different ways that we can categorize them. Two of the major categories of encryption algorithms are symmetric and asymmetric algorithms. You may already be familiar with the concept of symmetry, meaning that two things are the same. Symmetric shapes have two sides that when divided along an axis are identical. Similarly, the human face may be symmetric. In cryptography, symmetry relates to keys rather than shapes. And we have two categories of encryption algorithms. In symmetric encryption algorithms also known as shared secret encryption algorithms, the encryption and decryption operation use the same key. If one user encrypts a message using the secret key apple, a second user would have to decrypt the message with that same secret key, it's a shared secret. Asymmetric encryption algorithms on the other hand use different keys…

Contents