Symmetric Key Encryption:
This is also referred as Secret Key Encryption as a single Secret Key is used for Encryption as well as Decryption. Assume that Alice needs to send some sensitive information to Bob. Alice encrypts the message using a Secret Key and sends it to Bob. The Secret Key is also shared with Bob by some other means. Now, Bob decrypts the received message using the Secret Key which was shared by Alice.
Asymmetric Key Encryption:
Also referred as Public Key Encryption. Two keys, Public & Private are used for Encryption and Decryption. Public Key Encryption is developed by overcoming the limitations that are present in the Symmetric Key Encryption. Referring to the above example, say Alice has shared the Secret Key with Bob over telephone or email. Unfortunately, an attacker has managed to get the Secret Key which was shared in the email. So, now the attacker can decrypt the message. This is the issue when single key is used for Encryption and Decryption.
Public Key Encryption uses a key pair (Public Key, Private Key). Public Key is used for Encryption and Private Key is used for Decryption. Each individual holds a key pair. Public Key is made freely available so that anyone who wants to send a message can use it for encryption. Bob's Public Key is freely available. Now Alice encrypts the message using Bob's Public Key. Bob can decrypt the message with his Private Key. In this process, no key sharing is required.
This is also referred as Secret Key Encryption as a single Secret Key is used for Encryption as well as Decryption. Assume that Alice needs to send some sensitive information to Bob. Alice encrypts the message using a Secret Key and sends it to Bob. The Secret Key is also shared with Bob by some other means. Now, Bob decrypts the received message using the Secret Key which was shared by Alice.
Asymmetric Key Encryption:
Also referred as Public Key Encryption. Two keys, Public & Private are used for Encryption and Decryption. Public Key Encryption is developed by overcoming the limitations that are present in the Symmetric Key Encryption. Referring to the above example, say Alice has shared the Secret Key with Bob over telephone or email. Unfortunately, an attacker has managed to get the Secret Key which was shared in the email. So, now the attacker can decrypt the message. This is the issue when single key is used for Encryption and Decryption.
Public Key Encryption uses a key pair (Public Key, Private Key). Public Key is used for Encryption and Private Key is used for Decryption. Each individual holds a key pair. Public Key is made freely available so that anyone who wants to send a message can use it for encryption. Bob's Public Key is freely available. Now Alice encrypts the message using Bob's Public Key. Bob can decrypt the message with his Private Key. In this process, no key sharing is required.