From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Hybrid cryptography
From the course: Ethical Hacking: Cryptography
Hybrid cryptography
- [Instructor] So far, we've learned about the advantages and disadvantages of both asymmetric and symmetric cryptography. Let's do a quick review to ensure we can clearly see their distinct differences across various categories, starting with the key. Symmetric focuses on one shared key, asymmetric focuses on each user having their own key pair. When it comes to key exchange, symmetric uses an out-of-band technique whereby you cannot exchange the key digitally. Instead, we focus on meeting face-to-face, mailing it, or using our cell phones. When it comes to the number of unique keys, symmetric's equation grows exponentially with N times N - 1 divided by 2, where N equals a number of people involved. We walk through examples to showcase as N increases in quantity, it results in an unmanageable increasing rate of keys. Asymmetric's equation does not grow exponentially, which is represented by N times 2. When it comes to speed, symmetric exists today because it's computationally fast…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.