From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Symmetric encryption

Symmetric encryption

From the course: Ethical Hacking: Cryptography

Start my 1-month free trial

Symmetric encryption

- [Instructor] Symmetric encryption algorithms are computationally fast, meaning computers are very quick and very efficient in performing the math associated with symmetric encryption. Now recall you often hear this referred to as private key encryption. One of the drawbacks of symmetric encryption comes from scalability associated with large numbers of unique keys. There's an equation used to calculate based on n number of people trying to communicate, how many different symmetric encryption keys would you need? And that's this equation you see here. Let's through in examples so we can see what that really looks like. So say we have a group of five people. We've got Bob, Jon, Alice, Steph, and Sue and all five of them want to talk to each other. So for Bob and Jon to talk to each other in a secure manner using symmetric encryption, they have to have a symmetric key between the two of them. For Bob to talk Steph is in…

Contents