Better to know some... than all 


Symmetrickey vs. publickey cryptographySymmetrickey and publickey encryption schemes have various advantages and disadvantages, some of which are common to both. Advantages of symmetrickey cryptography1. Symmetrickey ciphers can be designed to have high rates of data throughput. Some hardware implementations achieve encrypt rates of hundreds of megabytes per second, while software implementations may attain throughput rates in the megabytes per second range. 2. Keys for symmetrickey ciphers are relatively short. 3. Symmetrickey ciphers can be employed as primitives to construct various cryptographic mechanisms including pseudorandom number generators, hash functions, and computationally efficient digital signature schemes, to name just a few. 4. Symmetrickey ciphers can be composed to produce stronger ciphers. Simple transformations which are easy to analyze, but on their own weak, can be used to construct strong product ciphers. 5. Symmetrickey encryption is perceived to have an extensive history, although it must be acknowledged that, notwithstanding the invention of rotor machines earlier, much of the knowledge in this area has been acquired subsequent to the invention of the digital computer, and, in particular, the design of the Data Encryption Standard in the early 1970s. Disadvantages of symmetrickey cryptography1. In a twoparty communication, the key must remain secret at both ends. 2. In a large network, there are many key pairs to be managed. Consequently, effective Key management requires the use of an unconditionally trusted TTP. 3. In a twoparty communication between entities A and B, sound cryptographic practice dictates that the key be changed frequently, and perhaps for each communication session. 4. Digital signature mechanisms arising from symmetrickey encryption typically require either large keys for the public verification function or the use of a TTP. Advantages of publickey cryptography1. Only the private key must be kept secret (authenticity of public keys must, however, be guaranteed). 2. The administration of keys on a network requires the presence of only a functionally trusted TTP as opposed to an unconditionally trusted TTP. Depending on the mode of usage, the TTP might only be required in an "offline" manner, as opposed to in real time. 3. Depending on the mode of usage, a private key/public key pair may remain unchanged for considerable periods of time, e.g., many sessions (even several years). 4. Many publickey schemes yield relatively efficient digital signature mechanisms. The key used to describe the public verification function is typically much smaller than for the symmetrickey counterpart. 5. In a large network, the number of keys necessary may be considerably smaller than in the symmetrickey scenario. Disadvantages of publickey encryption1. Throughput rates for the most popular publickey encryption methods are several orders of magnitude slower than the best known symmetrickey schemes. 2. Key sizes are typically much larger than those required for symmetrickey encryption, and the size of publickey signatures is larger than that of tags providing data origin authentication from symmetrickey techniques. 3. No publickey scheme has been proven to be secure (the same can be said for block ciphers). The most effective publickey encryption schemes found to date have their security based on the presumed difficulty of a small set of numbertheoretic problems. 4. Publickey cryptography does not have as extensive a history as symmetrickey encryption, being discovered only in the mid 1970s. 