What is asymmetric encryption?
D1 ยท General ยท CompTIA Security+ SY0-701Asymmetric encryption uses a key pair: a public key (shared openly) and a private key (kept secret). Data encrypted with the public key can only be decrypted with the private key. Examples: RSA, ECC, DSA.
| Property | Asymmetric | Symmetric |
|---|---|---|
| Keys | 2 (public + private) | 1 shared key |
| Speed | Slower | Faster |
| Use case | Key exchange, signatures | Bulk data encryption |
| Examples | RSA, ECC | AES, 3DES |
TLS uses asymmetric crypto to exchange keys, then symmetric crypto for the session. Best of both worlds.