xatoxi logos
xatoxi logos

4. Encryption Protocol

As of today, 95% of the world’s data is protected by either asymmetric encryption, better known, as public key cryptography, or by its predecessor: the symmetric encryption. Thus far, these encryption methods have allowed for our modern infrastructures to not only function but also thrive in today’s continuously data thriving economy. However, as the numbers of cyber-crimes only exponentially increase over the years, the user’s trust in companies to withhold information has not declined accordingly. The blind trust users misplace in the hands of oblivious and irresponsible companies that are not interested in investing resources in reassessing their digital safety guidelines to shield their client from the approaching threat of quantum is a colossal hazard to the pillars of modern society. It’s imperative that we examine alternatives to the currently used public key cryptographic primitives when assessing the extend of the vulnerability of our data especially since encryption evolved from a mathematical curiosity to an indispensable part of our IT infrastructure survival.

Key Differences. (Symmetric Encryption vs Asymmetric Encryption)

1) Number of keys

Symmetric Encryption - uses a single key for encryption and decryption.

Asymmetric Encryption - uses two keys for encryption and decryption

2) Size of cipher text

Symmetric Encryption - Smaller cipher text compares to original plain text file.

Asymmetric Encryption - Larger cipher text compares to original plain text file.

3) Data size

Symmetric Encryption - Used to transmit big data.

Asymmetric Encryption - Used to transmit small data.

4) Resource Utilization

Symmetric key encryption works on low usage of resources.

Asymmetric encryption requires high consumption of resources.

5) Security

Symmetric Encryption - Less secured due to use a single key for encryption.

Asymmetric Encryption -Much safer as two keys are involved in encryption and decryption.

6) Key Lengths

Symmetric Encryption - 128 or 256-bit key size

Asymmetric Encryption - RSA 2048-bit or higher key size.

7) Confidentiality

Symmetric Encryption - A single key for encryption and decryption has chances of key compromised.

Asymmetric Encryption - Two keys separately made for encryption and decryption that removes the need to share a key.

8) Speed

Symmetric encryption is fast technique

Asymmetric encryption is slower in terms of speed.

9) Algorithms

Symmetric encryption - RC4, AES, DES, 3DES, QUAD

Asymmetric encryption - RSA, Diffie-Hellman, ECC algorithms

 

If you compare symmetric-key encryption with public-key encryption, you will find that public-key encryption requires more calculations. Therefore, public-key encryption is not always appropriate for large amounts of data. However, it is possible to use public-key encryption to send a symmetric key, which you can then use to encrypt additional data.

© Xatoxi LTD 2023, All Rights Reserved.