2.3 Symmetric and Asymmetric Encryption
2.3 Symmetric and Asymmetric Encryption
• To get back to the original message, it will be necessary to apply the same decryption key; that is, 4 2 9 1 3
6 2 8 5 6.
• But in this case, the decryption process would be the reverse of encryption and each letter would be
shifted –4, –2, –9, –1, and so on.
• However, modern computers could ‘crack’ this encryption key in a matter of seconds.
• Therefore, the issue of security is always the main drawback of symmetrical encryption, since a single
encryption key is required for both sender and recipient.
Asymmetric encryption
• Asymmetric encryption was developed to overcome the security problems associated with symmetric
encryption. It makes use of two keys called the public key and the private key:
» public key (made available to everybody)
» private key (only known to the computer user).
• Both types of key are needed to encrypt and decrypt messages.
EXAMPLE - suppose Tom and Jane work for the same company and Tom wishes to send a confidential
document to Jane:
• However, if a two-way communication is required between all five workers, then they all need to
generate their own matching public and private keys.
• Once this is done, all users then need to swap public keys so that they can send encrypted
documents/files/messages between each other. Each worker will then use their own private key to
decrypt information being sent to them.