From the course: Exploring Tor and the Dark Web

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Symmetric and asymmetric cryptography

Symmetric and asymmetric cryptography - Tor Browser Tutorial

From the course: Exploring Tor and the Dark Web

Symmetric and asymmetric cryptography

- [Instructor] There are many different kinds of encryption algorithms, and there are different ways that we can categorize them. Two of the major categories of encryption algorithms are symmetric and asymmetric algorithms. Now, you're probably already familiar with the concept of symmetry, meaning that two things are the same. Symmetric shapes have two sides that when divided along an axis are identical. Similarly, the structure of the human face is symmetric. In cryptography, symmetry relates to keys rather than shapes. We have two categories of encryption algorithms. In symmetric encryption algorithms, also known as shared secret encryption algorithms, the encryption and decryption operations use the same key. If one user encrypts a message using the secret key apple, a second user would have to decrypt the message with that same key. It's a shared secret. Asymmetric encryption algorithms, on the other hand, use different keys for encryption and decryption. They're also known as…

Contents