Chapter 2 2_Symmetric and Asymmetric Encryption
Chapter 2 2_Symmetric and Asymmetric Encryption
These algorithms use a single key for both encryption and decryption. They are fast and efficient for
large-scale data encryption.
• Strengths: Highly secure, fast, widely adopted (used in TLS, VPNs, disk encryption).
• Use Cases: Wi-Fi security (WPA2, WPA3), file encryption, government use (NIST standard).
• Use Cases: Used in legacy banking systems and older encryption protocols.
Blowfish
• Weaknesses: 64-bit block size makes it less secure than AES for large data.
Twofish
These algorithms use a public key for encryption and a private key for decryption, ensuring secure key
exchange and authentication.
RSA (Rivest-Shamir-Adleman)
• Strengths: Same security as RSA but with smaller keys and faster performance.
Hashing functions convert data into fixed-length values, ensuring data integrity without encryption.
• Use Case: Still used for checksums but not for security applications.
bcrypt
Argon2
• Strengths: Memory-hard function, best for password hashing (winner of Password Hashing
Competition).
Some systems use both types for enhanced security and efficiency.
Algorithm
Algorithm Strengths Common Use Cases
Type
Login systems,
bcrypt Secure password hashing
authentication