Symmetric key cryptography has several disadvantages, primarily the challenge of secure key distribution, as both parties must share the same secret key without interception. Additionally, if the key is compromised, all data encrypted with that key becomes vulnerable. Moreover, managing multiple keys for different users can become complex, as the number of keys increases exponentially with the number of participants. Lastly, symmetric encryption does not provide non-repudiation, making it difficult to prove the origin of a message.
There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography
Symmetric
Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.
The primary disadvantage of symmetric cryptography is that it requires both parties to share the same secret key for encryption and decryption, which poses a significant key distribution challenge. If the key is intercepted during transmission or if it is compromised, the security of the entire communication can be breached. Additionally, managing and securely storing keys becomes increasingly complex as the number of users grows, leading to potential vulnerabilities.
Math algorithms are complex and can easily be broken
There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography
There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography
Yes
Symmetric
In symmetric key encryption there is one key that is shared with the person you want to share with your data. The largest disadvantage is that you have to make sure that the key remain secret.
Symmetric cryptography only requires one key for both encryption and decryption and therefore in some cases are a issue.
following steps are involved in symmetric cryptography 1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key. 2- the sender sends the ciphertext message to the recipient. 3- the recipient decrypts the ciphertext message into plain text with a shared key.
Three methods of cryptography are Substitution (substituting one symbol for another), Transposition (rearranging the order of the characters), and Steganography (hiding the existence of the message).
Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.
3DES
AES
There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.