A class of cipher that uses identical keys for encryption and decryption.
A symmetric key may be referred to as:
secret key
private key
shared key
Examples
DES (Data Encryption Standard)
3DES (Triple Data Encryption Standard)
RC (Rivest Cipher)
AES (Advanced Encryption Standard)
Asymmetric Key Algorithms
Asymmetric Key Algorithm:
A type of cipher that uses a pair of different keys to encrypt and decrypt data.
An asymmetric encryption algorithm uses a pair of keys:
Public Key:
Encrypts Data
Private Key:
Decrypts Data
Examples of asymmetric encryption algorithms include:
RSA:
Named after Rivest, Shamir, and Adleman, who created the algorithm.
The primary use of this asymmetric algorithm today is authentication.
RSA is also known as public key cryptography standard (PKCS) #1.
The key length may be from 512 to 2048, and a minimum size for good security is at least 1024. Regarding security, bigger is better.
DH:
The Diffie-Hellman key exchange protocol is an asymmetric algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network.
Although the algorithm itself is asymmetric, the keys generated by the exchange are symmetric keys that can then be used with symmetric algorithms such as Triple Digital Encryption Standard (3DES) and Advanced Encryption Standard (AES).
El-Gamal:
This asymmetric encryption system is based on the DH exchange.
DSA:
The Digital Signature Algorithm was developed by the U.S. National Security Agency.
ECC:
Elliptic Curve Cryptography is a public-key cryptography based on the algebraic structure of elliptic curves over finite fields.