# New Technology

Trending Technology Machine Learning, Artificial Intelligent, Block Chain, IoT, DevOps, Data Science

## Search This Blog

Symmetric Key
• A symmetric key algorithm require the same key for both encryption of a plaintext and decryption of a cipher text.
• This same key is also called a shared secret.
• Symmetric key algorithm are generally much faster (hundreds to thousands times) to encrypt and decrypt a message than asymmetric key algorithm.
•  Big disadvantage of using a symmetric key algorithm is that both sender (Alice) and receiver (Bob) needs to know the shared secret.
• Few symmetric key algorithms: AES (Advanced Encryption Standard). Triple DES (Data Encryption Standard)

Example :-

Asymmetric Key
• An asymmetric key algorithm requires two keys called a public key and private key. One of the key is used for encryption of a plaintext and the other key is used for decryption of the cipher text.
• If Alice generates a private key and a corresponding public key, than anyone allowed to know her public key, but Alice must keep her private secret.
• A big disadvantage is that asymmetric key algorithms are generally much slower (hundred to thousands times) to encrypt and decrypt a message than symmetric key algorithms.
• The advantage of using an asymmetric key algorithm is that any sender can encrypt a message using the receiver public key, but only the receiver can decrypt the cipher text using its private key.
• A public key and private key are mathematically interconnected. Meaning each public key has only one corresponding private key.
• Few asymmetric key algorithms: RSA (Rivest Shamir Adleman), ECDSA (Elliptic Curve Digital Signature Algorithm)
• In blockchain the Elliptic Curve Digital Signature Algorithm is often used.

Examples :-

1. 2. 