Before getting deep into the second part of the Cryptography (**Asymmetric Cryptography**), let’s do a quick recap of the previous part (**Symmetric Cryptography**).

There are two properties of the **Symmetric** (**secret-key**) **crypto-systems**:

- The same secret
**key**() is used for both encryption and decryption.*k* - Encryption and Decryption are very similar or even identical functions.

For example, the safe box with a strong lock, where only **Alice** and **Bob** have a copy of the key.

**Alice****encrypts**(locks message in the safe with her key).- While,
**Bob****decrypts**(uses his copy of the key to open the safe).

**Fact:** The **Symmetric algorithms** are very __secure__, __fast__ & __widespread__ such as, AES, 3DES and more. However, the problem consists of two things:

**Key distribution problem**, where the (**secret key**) must be transported securely.**Non-repudiation**, where Alice or Bob can cheat each other, because they have identical keys. For example, Alice can claim that she never ordered an Apple TV online from Bob (he could have fabricated her order).**Number of keys**in a network, where each pair of users requires an individual key. For example, () is the number of users in the network, while each user stores (*n*) number of keys. This means that we will be having a total of (*n-1***6 users**) and (**15 keys**). See the figure below for more details:

Therefore, **Asymmetric Cryptography** plays an important role to prevent this (**non-repudiation**) and to provide **more security**.

Advertisements