Asymmetric Cryptography | Symmetric Cryptography |
Require two keys one for encrypt and other one to decrypt. | Require only one key both for encryption and decryption. |
Size of cipher text is same or lager than original text. | Size of cipher text is same or smaller than original text. |
Encryption process is slow. | Encryption process is very fast. |
Used to transfer small amount of data. | Used to transfer large amount of data. |
Provides confidentiality, authenticity and non-repudiation. | Only provides confidentiality. |
Examples: ECC, DSA and RSA | Examples:DES and RC4 |
Resource utilization is high. | Resource utilization is low as compared to asymmetric key encryption. |
Get Answers For Free
Most questions answered within 1 hours.