0% found this document useful (0 votes)
3 views

Symmetric Encryption Algorithms

The document outlines symmetric and asymmetric encryption algorithms. Symmetric encryption uses a single key for both encryption and decryption, with examples including AES, DES, and Blowfish, while asymmetric encryption employs a public and private key, featuring algorithms like RSA and ECC. Each algorithm has its own strengths and weaknesses, impacting their use in various applications.

Uploaded by

theemuga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Symmetric Encryption Algorithms

The document outlines symmetric and asymmetric encryption algorithms. Symmetric encryption uses a single key for both encryption and decryption, with examples including AES, DES, and Blowfish, while asymmetric encryption employs a public and private key, featuring algorithms like RSA and ECC. Each algorithm has its own strengths and weaknesses, impacting their use in various applications.

Uploaded by

theemuga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Symmetric Encryption Algorithms

Symmetric encryption uses a single key for both encryption and decryption. It is faster and more
efficient for encrypting large amounts of data.

1. AES (Advanced Encryption Standard) – A widely used encryption standard with key sizes of 128,
192, or 256 bits, known for its strong security and efficiency.

2. DES (Data Encryption Standard) – A 56-bit key encryption algorithm, now considered weak due
to vulnerability to brute-force attacks.

3. 3DES (Triple DES) – An improvement over DES that applies encryption three times to each data
block, making it more secure but slower.

4. Blowfish – A fast, flexible block cipher with a key size of up to 448 bits, widely used for secure
communications.

5. Twofish – A successor to Blowfish, featuring a 128-bit block size and key sizes up to 256 bits,
offering high security.

6. RC4 (Rivest Cipher 4) – A stream cipher widely used in protocols like WEP and TLS, though now
considered weak due to known vulnerabilities.

7. IDEA (International Data Encryption Algorithm) – A symmetric encryption algorithm with a 128-
bit key, used in applications like PGP (Pretty Good Privacy).

Asymmetric Encryption Algorithms

Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption. It is
commonly used in digital signatures and secure key exchange.

1. RSA (Rivest-Shamir-Adleman) – A widely used public-key algorithm that relies on the difficulty
of factoring large prime numbers. Used in SSL/TLS, digital signatures, and secure email.

2. Diffie-Hellman (DH) – A key exchange algorithm that allows two parties to securely generate a
shared secret key over an insecure channel.

3. ECC (Elliptic Curve Cryptography) – A modern asymmetric algorithm offering strong security
with smaller key sizes, making it efficient for mobile and IoT devices.

4. ElGamal – A public-key cryptosystem based on the Diffie-Hellman key exchange, used in


encryption and digital signatures.

5. DSA (Digital Signature Algorithm) – Primarily used for digital signatures and authentication
rather than general encryption.

You might also like