Asymmetric Systems
–Uses a pair of keys (private and public) for encryption and decryption
–Built upon hard-to-resolve mathematical problem using factorization, discreet logarithms, and the elliptic curve theory.
–Slower than symmetric algorithm.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Types of Asymmetric Systems
- The Diffie-Hellman Algorithm
 - RSA
 - El Gamal
 - Elliptic Curve Cryptosystems
 - LUC
 - Knapsack
 - Zero Knowledge Proof
 
[bs_icon name=”glyphicon glyphicon-chevron-right”] Symmetric Systems
–Uses a shared secret key for encryption and decryption
–Based on mathematical transposition and substitution functions
–Faster than asymmetric and hard to break.
–Examples below:
- Data Encryption Standard (DES)
 - Triple-DES
 - Advance Encryption Standard (AES)
 - International Data Encryption Algorithm (IDEA)
 - Blowfish
 - RC4
 - RC5
 - RC6
 
Source by wikipedia
To Become Cretified For CISSP Please Visit This Link ;
                        
                        
 
 
 
 
 
 
							
							