DEV Community

Cover image for Symmetric and Asymmetric Cryptography
MORDECAI ETUKUDO
MORDECAI ETUKUDO

Posted on

Symmetric and Asymmetric Cryptography

Symmetric and Asymmetric Cryptography

'Cryptography' is literally the study of hiding information. There are two main types of cryptography you'll encounter day to day:

Symmetric Cryptography is where the same key is used to encrypt and decrypt. It's hundreds of years old and has been used by everyone from the ancient Egyptians to Queen Elizabeth I.

There's a variety of symmetric cryptography algorithms, but the most common you'll see today are AES and Chacha20.

*Asymmetric Cryptography
*

Asymmetric cryptography - also called 'public key cryptography' was developed in the 1970s. In asymmetric cryptography, participants have pairs of keys (or keypairs). Each keypair consists of a secret key and a public key. Asymmetric encryption works differently from symmetric encryption, and can do different things:

Encryption: if it's encrypted with a public key, only the secret key from the same keypair can be used to read it

Signatures: if it's encrypted with a secret key, the public key from the same keypair can be used to prove the secret key holder signed it.

You can even use asymmetric cryptography to work out a good key for symmetric cryptography! This is called key exchange, where you use your public keys and the recipient's public key to come up with a 'session' key.

There's a variety of asymmetric cryptography algorithms, but the most common you'll see today are variants of ECC or RSA.

Asymmetric encryption is very popular:

Your bank card has a secret key inside it that's used to sign transactions.

Your bank can confirm you made the transaction by checking them with the matching public key.

Websites include a public key in their certificate. Your browser will use this public key to encrypt the data (like personal information, login details, and credit card numbers) it sends to the web page.

The website has the matching private key so that the website can read the data.

Your electronic passport was signed by the country that issued it to ensure the passport isn't forged.

The electronic passport gates can confirm this using the public key of your issuing country.

The messaging apps on your phone use key exchange to make a _

Image description_

Image of Datadog

The Essential Toolkit for Front-end Developers

Take a user-centric approach to front-end monitoring that evolves alongside increasingly complex frameworks and single-page applications.

Get The Kit

Top comments (0)

Billboard image

The Next Generation Developer Platform

Coherence is the first Platform-as-a-Service you can control. Unlike "black-box" platforms that are opinionated about the infra you can deploy, Coherence is powered by CNC, the open-source IaC framework, which offers limitless customization.

Learn more

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay