From the course: Computer Science Principles: The Internet

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Symmetric and asymmetric keys

Symmetric and asymmetric keys

From the course: Computer Science Principles: The Internet

Start my 1-month free trial

Symmetric and asymmetric keys

- Simple keys like the Caesar Cipher require that both sides of the message agree on what the key is and will be applied to the message before it's sent. This is called Symmetric Security. This works fine in situations where you have exchanged that information in private, but in the case of the internet, it wouldn't work. If I want to establish a security key with a server, If I want to let that server know what the key is, I would need to send it to the server over an unsecure connection. So anyone could read what the security key is. And then potentially use it to intercept messages and crack them later on. The trick to make this work is to have two keys. One that the sender uses to encrypt and send information, but is not able to be used to decrypt it. The other is a key that is only on the receiver's end, and can be used to decrypt all the information that it receives. This is called asymmetric security. So as a sender encrypts and sends information, even if someone is able to…

Contents