answersLogoWhite

0


Best Answer

There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.

User Avatar

Leland Grant

Lvl 10
3y ago
This answer is:
User Avatar
More answers
User Avatar

BeachToken

Lvl 4
1y ago

Symmetric cryptography, known also as secret key cryptography, is the use of a single shared secret to share encrypted data between parties.

  • Beach Token
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is symmetric cryptography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is DES symmetric or asymmetric cryptography?

Symmetric


What is a common symmetric cryptography solution?

AES


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


Does symmetric cryptography use the same key to encrypt and decrypt a message?

Yes


Which is not a disadvantage of symmetric cryptography in IA?

Math algorithms are complex and can easily be broken


How asymmetric cryptography both requires and support the use of symmetric cryptography?

Lmfao - do Richard kays coursework by yourself instead of asking others to answer it for you.


What is a disadvantage of symmetric cryptoghrapy?

Symmetric cryptography only requires one key for both encryption and decryption and therefore in some cases are a issue.


What are the steps involved in symmetric cryptography Also explain key management in conventional cryptography using some example?

following steps are involved in symmetric cryptography 1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key. 2- the sender sends the ciphertext message to the recipient. 3- the recipient decrypts the ciphertext message into plain text with a shared key.


What statement relating to access control is accurate?

Symmetric cryptography is impractival when a large group is involved.


What is a symmetric encryption?

Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.


What is the two types of cryptography?

Three methods of cryptography are Substitution (substituting one symbol for another), Transposition (rearranging the order of the characters), and Steganography (hiding the existence of the message).