Symmetric Cryptography

Symmetric Cryptography:

Symmetric cryptography also known as secret key cryptography, has been in use for thousands of years in forms ranging from simple substitution ciphers to more complex constructions. However, developments in mathematics and the growth of computing power have made it possible to create ciphers that are effectively unbreakable.
To encrypt and decrypt the data symmetric cryptography uses a single private key. The party having this key can use it to encrypt and decrypt data.
The algorithm used in symmetric cryptography is fast and suitable for processing large streams of data.

Disadvantage of Symmetric Cryptography:

The disadvantage of symmetric cryptography is that it presumes two parties have agreed on a key and been able to exchange that key in a secure manner prior to communication. This is a significant challenge. Symmetric algorithms are usually mixed with public key algorithms to obtain a blend of security and speed.

 Symmetric Cryptography
 Symmetric Cryptography

Latest posts by James (see all)

Related Posts:

  • No Related Posts
This entry was posted in Network and Security. Bookmark the permalink.


  1. Paul says:

    By using “cipher” you can be able to keep secure the sensitive datas, the “cipher” is an intelligent system that knows how to encrypt and decrypt datas.

  2. Brad says:

    If you use two cipher and generate trully indedpendt key for each cipher it is hardly to break bruteforce AES.

  3. Amy says:

    The symmetric-key algorithms can’t be used for authentication or non-repudiation purposes and hence this could be considered as great disadvantage of Symmetric cryptography.