From 1ec93ec02d0ad23287a5489a8eeb88e8e133f4ce Mon Sep 17 00:00:00 2001 From: Ali Ajorian Date: Tue, 26 Nov 2024 10:04:03 +0100 Subject: [PATCH] added the article:symmetric-vs-asymmetric-cryptography --- .../article.md | 12 ++ .../illustration.svg | 152 ++++++++++++++++++ 2 files changed, 164 insertions(+) create mode 100644 2024/symmetric-vs-asymmetric-cryptography/article.md create mode 100644 2024/symmetric-vs-asymmetric-cryptography/illustration.svg diff --git a/2024/symmetric-vs-asymmetric-cryptography/article.md b/2024/symmetric-vs-asymmetric-cryptography/article.md new file mode 100644 index 00000000..004d410e --- /dev/null +++ b/2024/symmetric-vs-asymmetric-cryptography/article.md @@ -0,0 +1,12 @@ +# Symmetric vs. Asymmetric Cryptography + +In today’s digital world, securing information is essential. We use cryptography to convert data into unreadable code. There are two main types of cryptography: symmetric and asymmetric. + +Symmetric Cryptography is simpler and uses the same key for both encrypting (scrambling) and decrypting (unscrambling) information. This requires both parties to agree on a secret key in advance and keep it confidential, which can be challenging. + +Asymmetric cryptography, on the other hand, uses a pair of mathematically related keys. One key, called the private key, is used to encrypt a message, while the other, known as the public key, is used for decryption. + +In practice, both symmetric and asymmetric cryptography are used together, depending on the application. + +## Author +- Ali Ajorian \ No newline at end of file diff --git a/2024/symmetric-vs-asymmetric-cryptography/illustration.svg b/2024/symmetric-vs-asymmetric-cryptography/illustration.svg new file mode 100644 index 00000000..d45167f5 --- /dev/null +++ b/2024/symmetric-vs-asymmetric-cryptography/illustration.svg @@ -0,0 +1,152 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +