- Symmetric - One Private Key
- Asymmetric - One Private key and One Public Key
- uses the same key to encrypt and decrypt data
- it's computationally simple Compared to Asymmetric encryption/decryption
- if the key is ever compromised well then it's useless.
- uses a key pair: a private and public key
- you generate both a public key and private key at the same time, they are bound to each other.
- anything you encrypt using the public key can be decrypted with the private key and vice versa.
- it's Computationally heavy
- create an asymmetric key pair(Private and Public keys)
- exchange public keys.
- Each create your own unique symmetric key.
- encrypt your key using the other parties public key.
- exchange the encrypted symmetric keys
- use your private keys to decrypt the received symmetric keys.
fire the message over at which point the receiving party uses the same symmetric key to decrypt the message. basically you securely exchanged Symmetric keys. now does this sound confusing? cause it sure did to me the first 6 times I read it, which is why I made this pretty picture to makes sense of what's going on
So now you can see that you used the Asymmetric key's to securely exchange Symmetric keys to make communicating with larger messages possible.
Another important facet of Cryptography is the Initialization vector (IV), now the IV is used to ensure that the same message looks different each time it's encrypted.