0% found this document useful (0 votes)
2 views

Symmetric Encryption Algorithms

The document outlines symmetric and asymmetric encryption algorithms. Symmetric encryption uses a single key for both encryption and decryption, with examples including AES, DES, and Blowfish, while asymmetric encryption employs a public and private key, featuring algorithms like RSA and ECC. Each algorithm has its own strengths and weaknesses, impacting their use in various applications.

Uploaded by

theemuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Symmetric Encryption Algorithms

The document outlines symmetric and asymmetric encryption algorithms. Symmetric encryption uses a single key for both encryption and decryption, with examples including AES, DES, and Blowfish, while asymmetric encryption employs a public and private key, featuring algorithms like RSA and ECC. Each algorithm has its own strengths and weaknesses, impacting their use in various applications.

Uploaded by

theemuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Symmetric Encryption Algorithms

Symmetric encryption uses a single key for both encryption and decryption. It is faster and more
efficient for encrypting large amounts of data.

1. AES (Advanced Encryption Standard) – A widely used encryption standard with key sizes of 128,
192, or 256 bits, known for its strong security and efficiency.

2. DES (Data Encryption Standard) – A 56-bit key encryption algorithm, now considered weak due
to vulnerability to brute-force attacks.

3. 3DES (Triple DES) – An improvement over DES that applies encryption three times to each data
block, making it more secure but slower.

4. Blowfish – A fast, flexible block cipher with a key size of up to 448 bits, widely used for secure
communications.

5. Twofish – A successor to Blowfish, featuring a 128-bit block size and key sizes up to 256 bits,
offering high security.

6. RC4 (Rivest Cipher 4) – A stream cipher widely used in protocols like WEP and TLS, though now
considered weak due to known vulnerabilities.

7. IDEA (International Data Encryption Algorithm) – A symmetric encryption algorithm with a 128-
bit key, used in applications like PGP (Pretty Good Privacy).

Asymmetric Encryption Algorithms

Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption. It is
commonly used in digital signatures and secure key exchange.

1. RSA (Rivest-Shamir-Adleman) – A widely used public-key algorithm that relies on the difficulty
of factoring large prime numbers. Used in SSL/TLS, digital signatures, and secure email.

2. Diffie-Hellman (DH) – A key exchange algorithm that allows two parties to securely generate a
shared secret key over an insecure channel.

3. ECC (Elliptic Curve Cryptography) – A modern asymmetric algorithm offering strong security
with smaller key sizes, making it efficient for mobile and IoT devices.

4. ElGamal – A public-key cryptosystem based on the Diffie-Hellman key exchange, used in


encryption and digital signatures.

5. DSA (Digital Signature Algorithm) – Primarily used for digital signatures and authentication
rather than general encryption.

You might also like