answersLogoWhite

0


Best Answer

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

7y ago

Public key cryptography utilizes asymmetric encryption; a pair of algorithmically related keys are required to encrypt and decrypt messages. By design, one key is held "private" and the other is "public" i.e. available to anyone. Messages enrypted with the public key can only be decrypted using the private key; such messages can only be read by someone holding the private key. By this means messages can be sent securely to the holder of the private key. Messages encrypted with the private key can only be decrypted to an intelligible message using the public key. Certificate authorities can be used to confirm who the public key belongs to - thus providing authentication of the source of the private-key-signed message.

Messages Symmetric key cryptography utilizes the same key to encrypt and decrypt messages. Only parties with whom the key have been shared can encrypt and decrypt the messages sent using the key. This mainly provides for confidentiality.

Note that in some schemes public key cryptography is used to facilitate the exchange or establishment of shared symmetric keys for a communications session. That's how SSL/TLS works to establish secure channels - the ones that are supposed to give you a little picture of a padlock telling you your session is secure. Schemes that utilize public key encryption to exchange a temporary symmetric key are referred to as "hybrid cryptosystems".

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Compare public key cryptography and Symmetric key cryptography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What is symmetric cryptography?

There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.


What are the types of cryptography?

public key cryptography private key cryptography


Does symmetric cryptography use the same key to encrypt and decrypt a message?

Yes


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.


What are the Various synonyms for public key cryptography?

Public key cryptography is also known as assymteric key cryptography. It uses RSA algorithm ans is mainly for authentication.


What are different cryptography algorithms?

There are two types of cryptography algorithms: 1) Public key cryptography 2) Secret key cryptography


What is a disadvantage of symmetric cryptography?

In symmetric key encryption there is one key that is shared with the person you want to share with your data. The largest disadvantage is that you have to make sure that the key remain secret.


What are the differences between conventional and public key algorithms?

In cryptography, public key algorithms require two keys, one secret and one public. The public key is used in the encryption function, while the secret key is used in decryption . Conventional, or symmetric algorithms use a single key for both purposes.


The combination of a public key and a private key is known as a?

This is known as RSA encryption. Encryption involving a public and private key combination is known as asynchronous cryptography, as opposed to synchronous cryptography. It is also known as public key cryptography. RSA is an algorithm that may be used (but there are others that can be used), in public key cryptography. (A key pair)


What are the steps involved in symmetric cryptography Also explain key management in conventional cryptography using some example?

following steps are involved in symmetric cryptography 1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key. 2- the sender sends the ciphertext message to the recipient. 3- the recipient decrypts the ciphertext message into plain text with a shared key.