From the course: Exploring Tor and the Dark Web
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Symmetric and asymmetric cryptography - Tor Browser Tutorial
From the course: Exploring Tor and the Dark Web
Symmetric and asymmetric cryptography
- [Instructor] There are many different kinds of encryption algorithms, and there are different ways that we can categorize them. Two of the major categories of encryption algorithms are symmetric and asymmetric algorithms. Now, you're probably already familiar with the concept of symmetry, meaning that two things are the same. Symmetric shapes have two sides that when divided along an axis are identical. Similarly, the structure of the human face is symmetric. In cryptography, symmetry relates to keys rather than shapes. We have two categories of encryption algorithms. In symmetric encryption algorithms, also known as shared secret encryption algorithms, the encryption and decryption operations use the same key. If one user encrypts a message using the secret key apple, a second user would have to decrypt the message with that same key. It's a shared secret. Asymmetric encryption algorithms, on the other hand, use different keys for encryption and decryption. They're also known as…